ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism Research

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • Guide to business continuity planning during COVID-19

    Sponsored by: ComputerWeekly.com

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

  • IAM: Managing identity remains key to cyber security

    Sponsored by: ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Cyber attackers exploiting poor cloud security

    Sponsored by: ComputerWeekly.com

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • 86 million reasons to support No More Ransom

    Sponsored by: ComputerWeekly.com

    Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.

  • Top APAC security predictions for 2020

    Sponsored by: ComputerWeekly.com

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

  • Top 10 enterprise IT in the Benelux region stories of 2019

    Sponsored by: ComputerWeekly.com

    The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • IAM: Managing identity remains key to cyber security

    Sponsored by: ComputerWeekly.com

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

  • Cyber attackers exploiting poor cloud security

    Sponsored by: ComputerWeekly.com

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

  • Even fintech startups battling to meet cyber security skills

    Sponsored by: ComputerWeekly.com

    A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge

  • Security analytics: Enabling organisations to get ahead of attackers

    Sponsored by: ComputerWeekly.com

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

  • CIO Trends #9: Benelux

    Sponsored by: ComputerWeekly.com

    In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.

  • 86 million reasons to support No More Ransom

    Sponsored by: ComputerWeekly.com

    Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • Top 10 cyber crime stories of 2018

    Sponsored by: ComputerWeekly.com

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Multi-pronged approach to cyber security professional development

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

  • IAM: Key to security and business success in the digital era

    Sponsored by: ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • CIO Trends #7: Benelux

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

  • Focus: Enterprise Mobility Management

    Sponsored by: ComputerWeekly.com

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.