You've requested...

Malicious Cryptominers Want to Hijack Your Resources

If a new window did not open, click here to view this asset.

Download this next:

Malware Exploitation of Machine Identities

Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade.

Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.

These are also closely related to: "Malicious Cryptominers Want to Hijack Your Resources"

  • Cloud Growth vs. Cloud Security Incidents

    As the COVID-19 Pandemic accelerated businesses’ move to the cloud, cloud security incidents for the retail, manufacturing, and government industries rose by 402%, 230%, and 205%, respectively, according to Palo Alto Networks’ research.

    Companies who rapidly moved to the cloud without automated security controls in place have faced serious vulnerabilities. The following report details the scope of current cloud threats and identifies actionable steps your organization can take to reduce risks.

    Access this cloud security report to learn which security controls companies have neglected to invest in and what risks are most pressing in your specific industry and geography.

  • 2024 security report: Predictions from 3 CISOs

    Throughout 2024, forecasts Pete Nicoletti, Field CISO for Americas at Check Point Software Technologies, “AI-based tools will be used by cyber criminals to steal financial resources.”

    Along with delving into that prediction, the Check Point 2024 Cyber Security Report provides insights from 2 other CISOs and breaks down:

    • A timeline of cyber events from 2023
    • 5 noteworthy security trends
    • Descriptions of over 40 malware families
    • And more

    Keep reading to access the full report.

Find more content like what you just read:

  • Developer’s guide to secure coding

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

    Download

  • Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface

    Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.

    Download

  • Compare 3 Leading SASE Solutions

    SASE solutions aim to simplify system management by allowing IT administrators to easy manage all the necessary security measures and access permissions from a single cloud-based management architecture. Tap into this comparative report of SASE offerings by Palo Alto Networks, Cisco and Zscaler broken down by 8 sub-tests.

    Download

  • SASE put to the test: Top tools and vendors, compared

    To find out how three SASE products – Cisco Umbrella, Palo Alto Networks Prisma Access Enterprise and Zscaler Internet Access – stack up against each other, read this 20-page report by AV Comparatives.

    Download

  • Cloud NGFW: Best-in-Class Security, Unparalleled Simplicity on AWS

    Amazon Web Services (AWS) and Palo Alto Networks have introduced Cloud NGFW. Tap into this e-book to learn how to deploy next-generation protection quickly and easily.

    Download

  • Enterprise Strategy Group: Earlier ransomware detection and prevention with hardware and software

    Ransomware techniques are only becoming more sophisticated, and in order to stop attackers, organizations need to rethink their strategies. Read this e-book, produced by TechTarget’s Enterprise Strategy Group (ESG), to learn why a more active collaboration between security mechanisms is required to achieve earlier detection and prevention.

    Download

  • CW ANZ, July 2020: Expert Advice on Security

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • CW Nordics: Bergen's tech hub seeks global success

    Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.

    Download

  • CW Nordics - August-October 2020: Bergen's tech hub seeks global success

    Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.

    Download

  • Assessing your network-security posture: 6 considerations

    With advanced threats crowding the cyber landscape, how can you secure your dispersed workforce? This research report by Palo Alto Networks’ Unit 42 unpacks 6 components of a strong network-security posture. Keep reading to discover those insights – and much more.

    Download

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

    Download

  • Cybersecurity solutions built for today’s cloud-centricity

    According to Gartner, by 2025, 95% of new digital workloads will be on cloud-native platforms. With organization’s moving rapidly to the cloud there is a fresh demand for modern cybersecurity. Read this product overview to learn about Palo Alto’s Cloud Next Generation Firewall (NGFW), an offering designed to meet today’s cloud-centric demands.

    Download

  • Top 10 CI/CD security risks you can't ignore

    Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.

    Download

  • Supply chain security: 5-part e-book

    The first step toward defending against supply chain attacks is deepening your understanding of how they work. Enter this e-book, which contains 5 articles about supply chain security. Download the book to discover 5 actions that you can take to level up your security posture – and much more.

    Download

  • Software supply chain security & the SOC: End-to-end security is key

    Check out this report to learn how a modern software security assurance strategy can bring the SOC into the loop of continuous integration/continuous deployment (CI/CD) software development and release cycles. In addition, the report outlines comprehensive software supply chain security best practices.

    Download

  • Top 10 datacentre stories of 2018

    There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.

    Download

  • SecOps: Automate the repetitive things you do every day to ease

    Within your SOC, how much time a day is spent dealing with repetitive tasks? Automating these repetitive, low-skill activities can free up valuable time so you can focus on the critical threats, and proactively refine your defenses against the next attack. This white paper explores 10 ways you can automate your SOC. Read on to learn more.

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • CW Benelux February 2018

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

    Download

  • MicroScope - May 2019: Packaged services – the global shift towards virtual distribution

    In this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.

    Download

  • Computer Weekly – 30 April 2019: Inside Huawei

    In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.

    Download

  • Benelux focus: Moving to the cloud

    We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.

    Download

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • The CISO's guide to supply chain security

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

    Download

  • Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company

    In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.

    Download

  • February ezine: Look to the future

    An issue with plenty of predictions about what the year ahead holds for the channel

    Download

  • Top MITRE ATT&CK techniques from criminal/APT groups

    Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.

    Download

  • The essential guide to security

    Download The Essential Guide to Security to discover new security use cases as well as how to implement Splunk’s security product suite for advanced security analytics, security automation and orchestration (SOAR), Security Information and Event Management (SIEM), MITRE ATT&CK, machine learning and more, all in one place to power your SOC.

    Download

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

    Download

  • Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments

    In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.

    Download

  • MITRE ATT&CK, a guide for businesses in 2022

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.

    Download

  • Case Study: How supercomputing is transforming experimental science

    NERSC lead data scientist Debbie Bard talks about how large-scale data analytics using super computers is making new types of science possible

    Download

  • Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk

    In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.

    Download

  • Where IT Meets Geology: What A Core Sample of Your Environment Can Tell You

    In this blog post, discover how, in the same way a geological core sample helps scientists reconstruct past climates and movements, sampling your IT environment can give you a much clearer picture of what’s happened and what’s still going on.

    Download

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

    Download

  • How to build & deliver a successful modular content strategy

    Today, user experience is more important than ever. This means that organizations must ensure that their content is shown on the right channel at the right time. But how exactly can this best be done? Browse this guide to discover the benefits of modular content strategies.

    Download

  • Top 10 network stories of 2018

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

    Download

  • Top 10 datacentre stories of 2021

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

    Download

  • CW ANZ: Gearing up for 5G

    The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.

    Download

  • Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown

    In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.

    Download

  • Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?

    In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.

    Download

  • Deliver more reliable digital services by knowing what supports them

    One of your critical digital services has gone down and the clock is ticking. Each minute could be costing your business thousands of dollars – but you could greatly reduce this time. Read this guide to explore how and why businesses around the world are relying on ServiceNow to create service visibility.

    Download

  • How will you operationalize AI across your business?

    How can you confidently extend AI across your organization? In this white paper, you’ll learn about 6 different obstacles that impede AI progress and how you can overcome them with an AI-native architecture approach. Download now to discover how you can create an AI advantage for your business.

    Download