Security Software Research
-
CW Nordics August 2018
Sponsored by: TechTarget ComputerWeekly.comIn April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
-
Application security: More important than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
CW Nordics ezine February 2018
Sponsored by: TechTarget ComputerWeekly.comIn the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
-
CW Benelux February 2018
Sponsored by: TechTarget ComputerWeekly.comIn this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
CW Europe – December 2017
Sponsored by: TechTarget ComputerWeekly.comIn this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
SME security - a business imperative
Sponsored by: TechTarget ComputerWeekly.comA growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
-
Focus: Cyber security in the Nordics
Sponsored by: TechTarget ComputerWeekly.comWith the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
-
European Perceptions, Preparedness and Strategies for IoT Security
Sponsored by: TechTarget ComputerWeekly.comResearch from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
-
Focus: Infosec17
Sponsored by: TechTarget ComputerWeekly.comSecurity technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
-
Active defence through deceptive IPS
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
The currency of trust: why banks and insurers must make customer data safer and more secure
Sponsored by: TechTarget ComputerWeekly.comBanks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
-
Cyber security in the Middle East
Sponsored by: TechTarget ComputerWeekly.comAs organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
Focus ASEAN: Security & Digital Transformation
Sponsored by: TechTarget ComputerWeekly.comWith cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
Threat management: Essential guide
Sponsored by: TechTarget ComputerWeekly.comSecurity is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
-
Cisco ASA 5500 Series Adaptive Security Appliances
Sponsored by: Cisco Systems, Inc.Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
-
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
Sponsored by: Sunbelt SoftwareEndpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.