ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism Research

  • 2016 Cost of Data Breach Study: Impact of Business Continuity Management

    Sponsored by: IBM

    The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)

  • Safeguarding Vital Data Is a Battle You Can Win

    Sponsored by: Intel Security

    In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.

  • Ransomware: Threats, Motivations, and Tools of the Trade

    Sponsored by: Radware

    Today's hackers require less money and time than ever before to start their campaign. Learn more about how marketplace dynamics are shifting the scale of the modern attack landscape, and uncover access to a valuable resource for security professionals.

  • Industry Assessment: Key Findings on Effective Threat Protection

    Sponsored by: Check Point Software Technologies Ltd.

    This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.

  • Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. You'll also explore the emerging role of sandboxing as a powerful weapon in cyber security.

  • Ransomware: What You Need to Know

    Sponsored by: Check Point Software Technologies Ltd.

    This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • Report: Modern Threat Intelligence

    Sponsored by: IBM

    The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Terrorist use of the internet

    Sponsored by: ComputerWeekly.com

    Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?

  • Hackers, Hacking, and CEHv8

    Sponsored by: Global Knowledge

    This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.

  • CW Buyers Guide To Finance and Insurance

    Sponsored by: ComputerWeekly.com

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

  • Accenture Technology Vision 2014

    Sponsored by: ComputerWeekly.com

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Cybercrime and warfare: All that matters

    Sponsored by: ComputerWeekly.com

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • Global profiles of the fraudster

    Sponsored by: ComputerWeekly.com

    Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.

  • Up-to-the-Minute Global Threat Intelligence

    Sponsored by: IBM

    In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.

  • April Information Security - Defending Against the Digital Invasion

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.

  • Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape

    Sponsored by: Hewlett Packard Enterprise

    This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.

  • CW Europe – January 2015

    Sponsored by: ComputerWeekly.com

    As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.

  • Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation

    Sponsored by: IBM

    Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.