ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • CW Nordics August 2017

    Sponsored by: TechTarget ComputerWeekly.com

    The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.

  • SME security - a business imperative

    Sponsored by: TechTarget ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Focus: Cyber security in the Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • European Perceptions, Preparedness and Strategies for IoT Security

    Sponsored by: TechTarget ComputerWeekly.com

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

  • Focus: Infosec17

    Sponsored by: TechTarget ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • Active defence through deceptive IPS

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

  • Unified Communication: “It should work as easily as a telephone call!”

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

  • The Investigatory Powers Act 2016 and Internet Connections Records

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: TechTarget ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • Cyber security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: TechTarget ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

  • Hacking the Human Operating System

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

  • In 2017, the insider threat epidemic begins

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Focus: Securing for the future

    Sponsored by: TechTarget ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Technology, media and telecommunications predictions 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Deloitte predicts the key trends in technology, media and telecommunications in 2017

  • Protecting your organisation from itself

    Sponsored by: TechTarget ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Computer Weekly: Data Danger

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • CW Europe: December 2016 - February 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • Threat management: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • Focus: Securing new technology

    Sponsored by: TechTarget ComputerWeekly.com

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

  • Trouble at your door: targeted cyber attacks in the UK and Europe

    Sponsored by: TechTarget ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Focus: IT Security in the Middle East

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

  • Sandnet++ – A framework for analysing and visualising network traffic from malware

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.