ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism Research

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Sponsored by: Cisco Umbrella

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Securing DNS: What to Do, and What to be Aware of

    Sponsored by: Cisco Umbrella

    In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • Ransomware: The Most Profitable Malware in History

    Sponsored by: Cisco Umbrella

    Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity

    Sponsored by: ThreatConnect

    In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.

  • Cyber security in the Middle East

    Sponsored by: ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • Wright State University Expels Email Threats and Minimizes Risks with a Proactive Defense

    Sponsored by: Proofpoint, Inc.

    Wright State University faced a huge challenge in securing email and other communications, due to their highly transient student body of 18,000. In this concise case study, learn how the university was able to meet email and web security challenges like phishing, ransomware and malware.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

  • In 2017, the insider threat epidemic begins

    Sponsored by: ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Hacking the Human Operating System

    Sponsored by: ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).

  • Four Countermeasures to Protect Against Ransomware

    Sponsored by: Trend Micro

    Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.

  • Anatomy of a Hack Disrupted

    Sponsored by: LogRhythm, Inc.

    What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Businesses Eye VDI Security to Fight Cyberattacks

    Sponsored by: Citrix

    The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Up-to-the-Minute Global Threat Intelligence

    Sponsored by: IBM

    In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.