ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cyberterrorism White Papers

  • How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast

    Sponsored by: LogRhythm, Inc.

    Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.

  • IAM: Key to security and business success in the digital era

    Sponsored by: ComputerWeekly.com

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

  • The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence

    Sponsored by: Recorded Future

    It's easy to find descriptions of what threat intelligence is. But it's harder to learn how to use it to truly make your organization safe from cybercriminals. Continue reading to learn how threat intelligence can help everyone in cybersecurity anticipate problems, respond faster to attacks, and make better decisions on how to reduce risk.

  • User Behavior Analytics Overview

    Sponsored by: Splunk

    Data science and machine learning are joining forces to locate previously undetectable security treats with user behavior analytics. Discover how this coalition works, as well as 5 threat detection pain points, in this white paper.

  • No Kidnapping, No Ransom

    Sponsored by: Panda Security

    Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.

  • CIO Trends #7: Benelux

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.

  • Focus: Enterprise Mobility Management

    Sponsored by: ComputerWeekly.com

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • The importance of web security

    Sponsored by: IBM

    Join us as we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • Essential guide to dealing with a data breach

    Sponsored by: ComputerWeekly.com

    Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences

  • CIO Trends #6: Nordics

    Sponsored by: ComputerWeekly.com

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • Government IT strategy & challenges in Australia

    Sponsored by: ComputerWeekly.com

    In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.

  • The Top Cyber Security Trends in ANZ in 2017

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • The Hunt for IoT: The Rise of Thingbots in Europe

    Sponsored by: F5 Networks

    More attackers are using IoT devices to build malicious bots. Often times, IoT devices are easy to access and exploit due to open Telnet ports and manufacturers' lax security controls. Download this Threat Analysis Report on IoT devices to learn about these newly developed cyberweapons.

  • FBI warns of global ATM cyber crime spree

    Sponsored by: ComputerWeekly.com

    The FBI has issued a warning to banks that cyber criminals are planning to steal millions in a coordinated worldwide attack on cash machines

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Sponsored by: Cisco Umbrella

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Securing DNS: What to Do, and What to be Aware of

    Sponsored by: Cisco Umbrella

    In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.

  • Ransomware: The Most Profitable Malware in History

    Sponsored by: Cisco Umbrella

    Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.