You've requested...

Discover the defense deficit in most endpoint solutions

If a new window did not open, click here to view this asset.

Download this next:

Top 10 IT security stories of 2018

The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here’s a look back over Computer Weekly’s top 10 IT Security stories of 2018.

These are also closely related to: "Discover the defense deficit in most endpoint solutions"

  • Top MITRE ATT&CK techniques from criminal/APT groups

    McAfee’s latest report incorporates not only the malware zoo, but new analysis for what’s being detected in the wild.

    It also covers:

    • Threats to sectors and vectors
    • Sunburst malware and the SolarWinds supply chain compromise
    • Top MITRE ATT&CK techniques in Q4 2020 from criminal/APT groups
    • And much more

    Download the full report to uncover it all.

  • Hacking the Human Operating System

    The prevalence of social engineering in many publicly disclosed cyber attacks suggests there is either an inherent weakness in the ability of victims to distinguish malicious communications or that cyber criminals are using more complex methods to bypass the “human firewall”. 

    The truth likely lies somewhere between these two statements, but, regardless of the root cause, we can see that the first line of defence is evidently failing. More importantly, to blame users for breaches is not entirely fair. There are many examples of clearly unsafe user behaviour, but this report will demonstrate that attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences.

    This report will review the concept of social engineering. We will consider the techniques used in recent cyber attacks, as well as the levers to influence victims, communication channels and suggested controls to reduce the risks.

Find more content like what you just read:

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • CW APAC, April 2022: Trend Watch: Cyber security

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • CW Middle East Oct to Dec 2016

    In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • CIO Trends #11: Middle East

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

    Download

  • CIO Trends #11: Middle East

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Bolster signature-based malware detection with machine learning

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

    Download

  • Web security: Important but often overlooked

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

    Download

  • What can CIOs do about the skills shortage in ASEAN?

    In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.

    Download

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

    Download

  • 86 million reasons to support No More Ransom

    Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Computer Weekly – 24 October 2017: Where will AI take us?

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

    Download

  • Uber and Volkswagen: Handling ethics in IT

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

    Download

  • MITRE ATT&CK, a guide for businesses in 2022

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

    Download

  • Top vendors in endpoint security heading into 2024

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

    Download

  • The Enterprise Browser: Reducing Your VDI Dependency

    While virtual desktop infrastructure (VDI) is widely used, it comes with a number of security concerns. Download this white paper to learn how Island’s Enterprise Browser presents a secure alternative to VDI and begin reducing your virtual desktop dependency today.

    Download

  • The future of storage

    In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.

    Download

  • Cloud: A security risk and opportunity

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

    Download

  • Computer Weekly –11 April 2017: Virtual reality in healthcare

    In this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.

    Download

  • CIO Trends #7: Benelux

    In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

    Download

  • Security Analytics

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

    Download

  • Your expert guide to endpoint security

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

    Download

  • The Top Cyber Security Trends in ASEAN in 2017

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • 12 security orchestration use cases

    Security orchestration connects disparate security tools, teams and infrastructures for seamless, process-based security operations and incident response. This connectedness makes it a good enabler of security automation. Download this white paper for a comprehensive look at this and 11 other security orchestration use cases.

    Download

  • Your pocket e-guide to cloud security

    As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.

    Download

  • CW Benelux ezine August 2018

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

    Download

  • Focus: IT Security in the Middle East

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

    Download

  • Achieving continuous monitoring in the hybrid cloud

    Your monitoring strategy is vital to keeping networks and data secure. Inside this guide, industry expert Dave Shackleford uncovers the latest on how to factor the hybrid cloud variable into the security equation.

    Download

  • Ensure the security of your endpoint devices: Expert tips

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • Enterprise Strategy Group: The economic benefits of modernizing with AWS and SUSE

    Enterprise Strategy Group's report analyzes the economic impact of app and infrastructure modernization via AWS Pathways. Discover how it boosts business agility, security, and financials. Access the full insights on business transformation through modernization.

    Download

  • Enterprise Strategy Group: Explore the economic benefits of AWS and Softchoice

    This economic analysis by Enterprise Strategy Group examines the benefits of modernizing infrastructure and applications with AWS. The report details how AWS Modernization Pathways can help organizations transform their business. Read the full report to learn more.

    Download

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

    Download

  • Mobilizing a Zero Trust Security Model: SMBs Charting a New Course

    As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.

    Download

  • Panda Adaptive Defense 360 Technologies

    In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.

    Download

  • MicroScope – June 2019: Sourcing IT among the clouds

    Outsourcing is changing as the anything-as-a-service model takes off.

    Download

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

    Download

  • Endpoint Protection Buyer's Guide: Critical Capabilities Revealed

    Explore the critical capabilities required for modern endpoint protection, including AI-powered prevention, advanced detection and response, identity threat detection, threat intelligence, and managed threat hunting. Download the Endpoint Protection Buyer's Guide to learn how to secure your organization against today's sophisticated threats.

    Download

  • Trusted Infrastructure ebook

    Dell’s continuously modern, software-driven storage portfolio is built in collaboration with Intel® to drive innovation while delivering highly adaptable software architectures, comprehensive cyber resiliency and multi-cloud ecosystem flexibility for a continuously modern storage experience. Access the e-book to learn more.

    Download