ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism Research

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: TechTarget Security

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • Debunking APT myths: What it really means and what you can do about it

    Sponsored by: TechTarget Security

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Sponsored by: TechTarget Security

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • E-Guide: Clearing Up the Confusion to Prepare for APTs

    Sponsored by: Dell SecureWorks

    Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.

  • Cyber defense: Understanding and combating the threat

    Sponsored by: IBM

    The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.

  • The Reality of Cyber Warfare

    Sponsored by: AT&T Corp

    Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.

  • The Next Generation of Cybercrime: How it's evolved, where it's going

    Sponsored by: DellEMC and Intel®

    Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.

  • Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance

    Sponsored by: Silver Tail Systems

    This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.

  • Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy

    Sponsored by: Trend Micro, Inc.

    This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.

  • Slipping Through The Cracks Of Web Services To Serve Malware

    Sponsored by: Trend Micro, Inc.

    Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.

  • First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

    Sponsored by: ArcSight, an HP Company

    The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Presentation Transcript: WWW - World Wide Weaponization

    Sponsored by: ESET

    The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

  • Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    Sponsored by: Tripwire, Inc.

    This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.

  • The Cybercrime Arms Race

    Sponsored by: Kaspersky

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.