Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.