Hackers Research
-
Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
-
Computer Weekly – 1 August 2023: We're doing AI all wrong
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
-
Computer Weekly – 25 July 2023: Getting comfortable with data
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.
-
Computer Weekly – 23 May 2023: How to secure your software supply chain
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
-
CW APAC May 2023 – Expert advice on security and threat intelligence
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
-
Securing your software supply chain
Sponsored by: TechTarget ComputerWeekly.comOrganisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Identity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comIdentity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
-
AI in Fraud Management: Uses cases, benefits and challenges
Sponsored by: TechTarget ComputerWeekly.comAI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
Top 11 cloud security challenges and how to combat them
Sponsored by: TechTarget ComputerWeekly.comMany organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
-
12 API security best practices
Sponsored by: TechTarget ComputerWeekly.comAs more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
5 types of data security
Sponsored by: TechTarget ComputerWeekly.comBecause no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
-
Multifactor authentication: What are the pros and cons?
Sponsored by: TechTarget ComputerWeekly.comOne of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
-
How do cybercriminals steal credit card information?
Sponsored by: TechTarget ComputerWeekly.comCybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Infographic: 5 cybersecurity trends for 2023
Sponsored by: TechTarget ComputerWeekly.comThe key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
-
Top 10 ANZ IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comIn this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
-
Top 10 ASEAN IT stories of 2022
Sponsored by: TechTarget ComputerWeekly.comDespite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
-
A Computer Weekly buyer's guide to anti-ransomware
Sponsored by: TechTarget ComputerWeekly.comThe threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
-
Guide to building an enterprise API strategy
Sponsored by: TechTarget ComputerWeekly.comToday's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
-
Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
-
9 Common Cryptocurrency Scams in 2023
Sponsored by: TechTarget ComputerWeekly.comEven though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
-
10 types of security incidents and how to handle them
Sponsored by: TechTarget ComputerWeekly.comCyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
-
Buyer's guide to backup and recovery software
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
-
Tech career guide: Cyber security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
-
Royal Holloway: Corporate under-reporting of cyber crime
Sponsored by: TechTarget ComputerWeekly.comWithout reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.