ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism White Papers

  • A Computer Weekly buyer's guide to cyber insurance

    Sponsored by: ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

  • CW Europe - June-August 2022: Russia escalates cyber war on Ukraine

    Sponsored by: ComputerWeekly.com

    Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.

  • BlackCat emerges as one of the top ransomware threats

    Sponsored by: ComputerWeekly.com

    After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

  • MITRE ATT&CK: Climb to the top

    Sponsored by: ComputerWeekly.com

    The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • 5 cybersecurity myths and how to address them

    Sponsored by: ComputerWeekly.com

    Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.

  • Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • Ransomware: The situation at the beggining of 2022

    Sponsored by: ComputerWeekly.com

    2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

  • Infographic: 5 cybersecurity predictions for 2022

    Sponsored by: ComputerWeekly.com

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

  • Infographic: 4 types of ransomware

    Sponsored by: ComputerWeekly.com

    Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

  • Ransomware Weather Report - July 2021

    Sponsored by: ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Infographic: Ransomware timeline

    Sponsored by: ComputerWeekly.com

    Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.

  • Infographic: Ransomware Weather Report 2021

    Sponsored by: ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape in 2020 and 2021. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • Top 10 cyber crime stories of 2019

    Sponsored by: ComputerWeekly.com

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

  • Ransomware Weather Report - July 2021

    Sponsored by: ComputerWeekly.com

    In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

  • Australia's cybersecurity game plan

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

  • IT/OT convergence is necessary, but not so simple

    Sponsored by: ComputerWeekly.com

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.