Security Research
-
A case study in critical infrastructure interdependency
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
Analysis of the Linux Audit System
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Computer Weekly – 30 August 2016: Get protected
Sponsored by: TechTarget ComputerWeekly.comIt is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Cyber Security 2016 and beyond
Sponsored by: TechTarget ComputerWeekly.comCyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Guide to Flexible Working
Sponsored by: TechTarget ComputerWeekly.comThis guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
-
Tackling Mobile Security and BYOD Risks
Sponsored by: TechTarget SecurityThis expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.
-
CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
Sponsored by: TechTarget ComputerWeekly.comTech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
-
Cloud Security that Strikes the Perfect Chord
Sponsored by: AWS Palo Alto NetworksIt can be hard to synchronize your security instruments to detect threats and automatically respond to attacks. Security services from AWS paired with products from Palo Alto Networks can help you harmonize your cloud environments, accounts, and pipelines to keep them working together for comprehensive security.
-
How IAM Systems Support Compliance
Sponsored by: Beta SystemsMany organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
-
5 IAM Trends Shaping the Future of Security
Sponsored by: Beta SystemsModern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
-
Computer Weekly - 7 April 2020: Adapting IT to the new normal
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
-
Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.
-
Can Lady Gaga and Madonna get people to take security seriously
Sponsored by: TechTarget ComputerWeekly.comWhat does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
-
12 Essential Features of Advanced Endpoint Security Tools
Sponsored by: ClaranetEndpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
-
Why You Should Consider Endpoint Detection & Response
Sponsored by: ClaranetEndpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
-
CW Benelux: Dutch banks fight money laundering
Sponsored by: TechTarget ComputerWeekly.comDutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
-
A Computer Weekly buyer’s guide to compliance, risk and governance
Sponsored by: TechTarget ComputerWeekly.comManaging data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach