ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies

    Sponsored by: ComputerWeekly.com

    This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

  • Royal Holloway: Corporate under-reporting of cyber crime

    Sponsored by: ComputerWeekly.com

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • MicroScope – May 2022: Charging at SME security challenges

    Sponsored by: MicroScope

    With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working

  • Deep learning for countering energy theft – a hybrid long-short term memory approach

    Sponsored by: ComputerWeekly.com

    Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.

  • Royal Holloway: Cloud-native honeypot deployment

    Sponsored by: ComputerWeekly.com

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

  • All together now

    Sponsored by: ServiceNow

    2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.

  • Transforming risk Why digital transformation depends on integrated risk management

    Sponsored by: ServiceNow

    Embarking on a digital transformation without considering risk management is like doing a massive home remodel on top of a crumbling foundation – which is why IT and non-IT leaders are embracing integrated risk management (IRM) as part of their transformation. Read this e-book to learn more about IRM and it’s role in digital transformation.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • 5 cybersecurity myths and how to address them

    Sponsored by: ComputerWeekly.com

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • PCI and GDPR Data Protection Requirements Met with Zero Downtime

    Sponsored by: Comforte AG

    Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.

  • MicroScope – February 2022: Spotting the hidden security dangers

    Sponsored by: MicroScope

    In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate

  • Top 10 cyber security stories of 2021

    Sponsored by: ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • The Impact of XDR in the Modern SOC

    Sponsored by: Dell SecureWorks

    Extended detection and response (XDR) is gaining momentum in the security arena. ESG recently surveyed IT/InfoSec professionals across multiple industry verticals to better understand the market perception of XDR, as well as value points and challenges that come with it. Access the full ESG report to see the impact of XDR in the modern SOC.

  • MicroScope – January 2022: Squaring up to ransomware

    Sponsored by: MicroScope

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

  • 13 steps for enabling secure remote work

    Sponsored by: ComputerWeekly.com

    Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.

  • The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *

    Sponsored by: Bitdefender

    Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.

  • Everything You Need to Know About the Log4j Vulnerability

    Sponsored by: TechTarget

    Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud

    Sponsored by: Proofpoint

    With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).

  • Fast Forward IAM

    Sponsored by: Beta Systems

    In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.

  • Cyber Security: 2021 Worst in Show

    Sponsored by: ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • Ransomware: The situation at the beginning of 2022 Infographic

    Sponsored by: ComputerWeekly.com

    The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.