ComputerWeekly.com Research Library

Powered by Bitpipe.com

Hackers Research

  • Tech career guide: Cyber security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

  • Royal Holloway: Corporate under-reporting of cyber crime

    Sponsored by: ComputerWeekly.com

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

  • Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • MITRE ATT&CK: Climb to the top

    Sponsored by: ComputerWeekly.com

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • All together now

    Sponsored by: ServiceNow

    2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.

  • Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.

  • Infographic: Ransomware timeline

    Sponsored by: ComputerWeekly.com

    Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.

  • CW APAC, October 2021: Tech Career Guide

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region

  • Password Security Guidelines

    Sponsored by: TechTarget

    In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.

  • How to Shrink Supply Chain Risk

    Sponsored by: TechTarget

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

  • Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

  • Infographic: 5 ways backup can protect against ransomware

    Sponsored by: ComputerWeekly.com

    Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.

  • Why are Acronis Cyber Protection Solutions Threatagnostic?

    Sponsored by: Acronis

    Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • Audi fine-tunes its digital performance to boost online car sales

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.

  • The State of Election Security

    Sponsored by: WhiteHat Security

    The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.

  • Addressing Complexity and Expertise in Application Security Testing

    Sponsored by: WhiteHat Security

    The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.

  • Security in the Fast Lane

    Sponsored by: WhiteHat Security

    Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.

  • Detecting and Defending Against SSRF

    Sponsored by: WhiteHat Security

    Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

  • Ransomware: The situation at the beginning of 2022 Infographic

    Sponsored by: ComputerWeekly.com

    The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.

Browse by Report Type: Hackers White Papers | Hackers Multimedia | Hackers IT Downloads

See more topics related to: Hackers

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.