Security Threats Research
-
Insuring the uninsurable: Is cyber insurance worth its salt?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
SME security - a business imperative
Sponsored by: TechTarget ComputerWeekly.comA growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
-
Focus: Cyber security in the Nordics
Sponsored by: TechTarget ComputerWeekly.comWith the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
-
Cyber Security Trends 2017 ASEAN
Sponsored by: TechTarget ComputerWeekly.comFor a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
-
European Perceptions, Preparedness and Strategies for IoT Security
Sponsored by: TechTarget ComputerWeekly.comResearch from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
-
Print security: An imperative in the IoT era
Sponsored by: TechTarget ComputerWeekly.comAnalyst group Quocirca gives the perspective on the risks and best practices of print security.
-
Focus: Infosec17
Sponsored by: TechTarget ComputerWeekly.comSecurity technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
-
Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
Sponsored by: IBMExplore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
-
How to Think like a Hacker to Stop Application Security Threats
Sponsored by: IBMFind out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
-
How to Increase Security for your Login on Mobile Applications
Sponsored by: IBMIn this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
-
Add-ons Secure Office 365 from Advanced Attacks
Sponsored by: OPSWAT incMicrosoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
How to Bolster Endpoint Security Protection
Sponsored by: SymantecThis expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
-
The Risks and Flaws of Open Source Security
Sponsored by: Flexera SoftwareIs open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.
-
Ransomware and Cloud Security: Keys to Stop the Threat
Sponsored by: Cisco UmbrellaHighly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
-
Securing DNS: What to Do, and What to be Aware of
Sponsored by: Cisco UmbrellaIn order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
-
Why Businesses Need a More Enlightened Approach to Phishing Attacks
Sponsored by: PhishMeDiscover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
-
Six Criteria for Buying Data Loss Prevention Products
Sponsored by: InteliSecureDiscover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
-
Introduction to Data Loss Prevention Tools
Sponsored by: InteliSecureIn this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
How IoT is Changing The Security Landscape
Sponsored by: Fortinet, Inc.In this expert-guide, learn more about the possible dangers of IoT, as well as some ideas on how you can redesign your security network to better combat hackers that would take advantage of this young technology.
-
The Security Risks of IoT
Sponsored by: Fortinet, Inc.In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.