ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Threats Research

  • CW Nordics August 2018

    Sponsored by: ComputerWeekly.com

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

  • CW Benelux ezine August 2018

    Sponsored by: ComputerWeekly.com

    It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".

  • CW ANZ: Fix the weak links

    Sponsored by: ComputerWeekly.com

    In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.

  • CW ASEAN: Defend against disruption

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Mobile Payments Using Host Card Emulation with NFC

    Sponsored by: ComputerWeekly.com

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Infosec culture: A former helicopter pilot's perspective

    Sponsored by: ComputerWeekly.com

    In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.

  • CW ASEAN: Time to dial up defences

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

  • Recent Ransomware Attacks Got you? Don't Cry; Fight Back!

    Sponsored by: SearchSecurity.com

    Recent ransomware attacks may make you WannaCry, but there's no time for that. It's time to learn what you can do to minimize the threat and how to deal if the worst happens. Start here to discover how to fight back against hackers, today.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Enterprises Wear Large Targets in Cloud Cryptomining Hacks

    Sponsored by: Cisco Umbrella

    Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.

  • 6 Ways to Prevent Ransomware in Health IT

    Sponsored by: Cisco Umbrella

    With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.

  • By the Numbers: Ransomware and Patient Data Breaches in Health IT

    Sponsored by: Cisco Umbrella

    Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.

  • Get Smart About Threat Intel Tools and Services

    Sponsored by: SearchSecurity.com

    Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.

  • Integrating IAM into your Digital Workspace

    Sponsored by: Citrix

    Learn how you can integrate identity and access management products into your digital workspace, and explore how security policies can take advantage of user's devices to provide context for determining access on the IT side.

  • Fundamentals of Endpoint Security: Anti-Malware Protection

    Sponsored by: Citrix

    Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.

  • Ins and Outs of Setting up a SOC

    Sponsored by: Respond Software

    Find out why a security operations center (SOC) can be a valuable part of your organization's cybersecurity strategy. Learn how to set one up, from the 3 types of SOC employees needed to core principles that organizations should follow when setting up their SOC.

  • How to Make the Most of your Detection and Response

    Sponsored by: Respond Software

    Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Automation in Cybersecurity

    Sponsored by: Juniper Networks

    During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques. Find out how automation in cybersecurity emphasizes the working relationship between AI and humans to prevent attacks.

  • New Cloud Threats to Watch Out for in 2018

    Sponsored by: Juniper Networks

    Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.

  • Data Classification Services and Keeping Cloud Data Secure

    Sponsored by: Data443

    In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.

  • GDPR Looms with Organizations Still Unprepared

    Sponsored by: Data443

    GDPR regulations are looming, and not every company is prepared. In this expert e-guide, explore how data management software suppliers are trying to help companies get on track and avoid stiff GDPR penalties.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.