EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
EGUIDE:
Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
WHITE PAPER:
Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
EGUIDE:
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
EZINE:
In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
EZINE:
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
INFOGRAPHIC:
Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
EGUIDE:
Mobile is quickly becoming one of the most used endpoints in the enterprise. However, there is a common misconception that mobile devices don't need protection, which is just not true. In this infographic, we put together four of the top mobile security threats, and steps IT organizations can take to protect these critical endpoints.