ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Research

  • 2 types of endpoint encryption to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: TechTarget ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: TechTarget ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Risk management is the beating heart of your cyber strategy

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • 5 cybersecurity myths and how to address them

    Sponsored by: TechTarget ComputerWeekly.com

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: TechTarget ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

  • Trust no one: Why zero trust security is taking the world by storm

    Sponsored by: TechTarget ComputerWeekly.com

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

  • Infographic: 5 essential open source cybersecurity tools for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.

  • Middle East - 2022 IT Priorities Survey Results

    Sponsored by: TechTarget ComputerWeekly.com

    This presentation shows the observations, budgets and broad inititatives in the Middle East for 2022 based on the results of TechTarget's 2022 IT Priorities survey that was conducted in the region.

  • Infographic: SIEM vs. SOAR vs. XDR

    Sponsored by: TechTarget ComputerWeekly.com

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

  • Top 10 ASEAN IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

  • Top 10 ANZ IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

  • Top 10 cyber security stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • Security Risks 2021: Ransomware And The Return To The Office

    Sponsored by: Illumio

    Although 2020 was a year largely defined by remote work, organizations are expected to transition towards a more hybrid work model for 2021 and beyond. Read this exclusive research report to unlock expert insight into the key security risks and challenges of a hybrid work model.

  • Infographic: Top IT predictions in APAC in 2022

    Sponsored by: TechTarget ComputerWeekly.com

    As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.

  • MITRE ATT&CK: Climb to the top

    Sponsored by: TechTarget ComputerWeekly.com

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

  • Ransomware: The situation at the beginning of 2022 Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.