Search Results for: security

Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

TechTarget ComputerWeekly.com

Four Ways to Increase Developer Buy in of AppSec
PH

Veracode, Inc.

Next generation network security
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

TechTarget ComputerWeekly.com

How Audit Compliance and Cloud Adoption Affects IT Security
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

Dell Software

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

TechTarget ComputerWeekly.com

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.

TechTarget ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure
In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

TechTarget ComputerWeekly.com

Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

TechTarget ComputerWeekly.com

Focus: Securing the cloud
While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

TechTarget ComputerWeekly.com