ComputerWeekly.com Research Library

Powered by Bitpipe.com

Hackers Research

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • Top IT Predictions in APAC 2020

    Sponsored by: TechTarget ComputerWeekly.com

    As the new decade dawns, we wanted to look ahead at the technologies likely to dominate the Asia-Pacific IT landscape in 2020.

  • CIO Trends #10: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • Top APAC security predictions for 2020

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

  • CIO Trends #10: Benelux

    Sponsored by: TechTarget ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • Top 10 ASEAN IT stories of 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.

  • CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

    Sponsored by: TechTarget ComputerWeekly.com

    There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

  • CW Benelux ezine February 2019

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

  • IAM: Key to security and business success in the digital era

    Sponsored by: TechTarget ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • CW ANZ: Fix the weak links

    Sponsored by: TechTarget ComputerWeekly.com

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • CW Benelux February 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

  • Safety Meshing: Hybrid trust models in social networks for end-to-end encryption

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.

  • Cyber Security Trends 2017 ASEAN

    Sponsored by: TechTarget ComputerWeekly.com

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Computer Weekly – 23 May 2017: Global ransomware attack could be a security wake-up call

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

  • Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment

    Sponsored by: TechTarget ComputerWeekly.com

    A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.

  • Towards more robust internetworks

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

  • Financial markets regulatory outlook 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • CW ASEAN November 2016

    Sponsored by: TechTarget Security

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.