Security Best Practices Research
-
Focus: Infosec17
Sponsored by: TechTarget ComputerWeekly.comSecurity technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
-
Active defence through deceptive IPS
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Cyber security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comAs organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
Focus ASEAN: Security & Digital Transformation
Sponsored by: TechTarget ComputerWeekly.comWith cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
-
Focus: Securing the cloud
Sponsored by: TechTarget ComputerWeekly.comWhile cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.
-
Hacking the Human Operating System
Sponsored by: TechTarget ComputerWeekly.comCyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Financial markets regulatory outlook 2017
Sponsored by: TechTarget ComputerWeekly.comFinancial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
-
Focus: Securing for the future
Sponsored by: TechTarget ComputerWeekly.com2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
-
Technology, media and telecommunications predictions 2017
Sponsored by: TechTarget ComputerWeekly.comDeloitte predicts the key trends in technology, media and telecommunications in 2017
-
Protecting your organisation from itself
Sponsored by: TechTarget ComputerWeekly.comThis report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
-
CW Europe: December 2016 - February 2017
Sponsored by: TechTarget ComputerWeekly.comSecurity continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
-
Threat management: Essential guide
Sponsored by: TechTarget ComputerWeekly.comSecurity is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
CW ASEAN November 2016
Sponsored by: TechTarget SecuritySmall businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
-
Focus: Securing new technology
Sponsored by: TechTarget ComputerWeekly.comThe scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.
-
Policing cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
Focus: IT Security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comIn this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.