ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism Research

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.

  • 3 Common Password Policy Mistakes

    Sponsored by: Specops Software

    Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    Sponsored by: McAfee, Inc.

    This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.

  • Cyber security in the Middle East

    Sponsored by: ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • Security Insights Magazine: 3 Accelerating Cybersecurity Trends

    Sponsored by: DynTek

    In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

  • The Different Types of Cyber-Attacks and How to Prevent Them

    Sponsored by: SonicWall

    This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more.

  • In 2017, the insider threat epidemic begins

    Sponsored by: ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Hacking the Human Operating System

    Sponsored by: ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • The Threat Lifecycle Management Framework

    Sponsored by: LogRhythm, Inc.

    You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM). Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR).

  • Anatomy of a Hack Disrupted

    Sponsored by: LogRhythm, Inc.

    What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

  • Understanding Cyberthreat Motivations to Improve Defense

    Sponsored by: McAfee, Inc.

    Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Sharing knowledge to tackle online banking fraud

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.

  • Terrorist use of the internet

    Sponsored by: ComputerWeekly.com

    Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?

  • Businesses Eye VDI Security to Fight Cyberattacks

    Sponsored by: Citrix

    The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Up-to-the-Minute Global Threat Intelligence

    Sponsored by: IBM

    In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.

  • April Information Security - Defending Against the Digital Invasion

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.

  • Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape

    Sponsored by: Hewlett Packard Enterprise

    This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.

  • CW Europe – January 2015

    Sponsored by: ComputerWeekly.com

    As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.