Cyberterrorism Research
-
Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
Guide to business continuity planning during COVID-19
Sponsored by: TechTarget ComputerWeekly.comAs COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
-
Top APAC security predictions for 2020
Sponsored by: TechTarget ComputerWeekly.comCyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
-
Top 10 enterprise IT in the Benelux region stories of 2019
Sponsored by: TechTarget ComputerWeekly.comThe Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
-
IAM: Managing identity remains key to cyber security
Sponsored by: TechTarget ComputerWeekly.comIT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
-
Cyber attackers exploiting poor cloud security
Sponsored by: TechTarget ComputerWeekly.comMore than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
-
Even fintech startups battling to meet cyber security skills
Sponsored by: TechTarget ComputerWeekly.comA study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
-
Security analytics: Enabling organisations to get ahead of attackers
Sponsored by: TechTarget ComputerWeekly.comIn the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
-
CIO Trends #9: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
-
86 million reasons to support No More Ransom
Sponsored by: TechTarget ComputerWeekly.comAnti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.
-
CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
Sponsored by: TechTarget ComputerWeekly.comThere is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
-
Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
-
A Computer Weekly buyer's guide to Threat Management
Sponsored by: TechTarget ComputerWeekly.comThreat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
-
Multi-pronged approach to cyber security professional development
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
-
IAM: Key to security and business success in the digital era
Sponsored by: TechTarget ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
CIO Trends #7: Benelux
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.
-
Network Security: Spotlight on Australia/New Zealand
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Focus: Enterprise Mobility Management
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
-
Application security: More important than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
World Economic Forum Global Risks Report 2018
Sponsored by: TechTarget ComputerWeekly.comThe World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
-
Essential guide to dealing with a data breach
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
-
CIO Trends #6: Nordics
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
-
Web security: Important but often overlooked
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.