Search Results for: security

CW APAC May 2023 – Expert advice on security and threat intelligence
Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.

TechTarget ComputerWeekly.com

Deciphering the Tactics of the Enemy: APT-Style Attacks
In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

Dimension Data

The Hidden Costs of Aging Endpoint Solutions
Existing security teams are overwhelmed due to the proliferation of threat alerts and associated false positives. Solutions like EDR and especially XDR deliver security incident detection and automated response capabilities for your security infrastructure. Read on in this white paper now to learn more.

Fortinet, Inc.

Multi-pronged approach to cyber security professional development
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

TechTarget ComputerWeekly.com

Cyber Security Trends 2017 ASEAN
For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

TechTarget ComputerWeekly.com

Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.

Veracode, Inc.

Spotlight on Emerging Ransomware Threats
Giving into ransom demands may not only lead to more ransomware attacks, but also more sophisticated ones. Paying those demands has the potential to create a false sense of security, unintended consequences and future liabilities. Tap into this e-guide to learn about current & emerging threats, best practices, and the negation process.

Commvault

Insuring the uninsurable: Is cyber insurance worth its salt?
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

TechTarget ComputerWeekly.com

CW APAC - March 2020: Expert Advice: Security Operations Centre
In this handbook, focused on the security operations centre in the Asia-Pacific region, Computer Weekly looks at these challenges, runs through the variety of SOCaaS options available and offers steps to create an effective team.

TechTarget ComputerWeekly.com