Enhance your workforce's cybersecurity awareness
By: StarHub View more from StarHub >>
Download this next:
Cybersecurity Awareness Training - Solution Demo
By: StarHub
Type: Video
Your employees could be the gateway for a massive cyberattack. Without proper training on the modern methods of bad actors, anyone, across your organization, could fall for today's phishing scams and open up Pandora's box. To ensure your team avoids such a calamity, discover the wealth of resources available to you with StarHub's training platform.
These are also closely related to: "Enhance your workforce's cybersecurity awareness"
-
COVID-19 in APAC:Tech industry lessons & innovations
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.
-
2025 Threat Landscape Predictions and the Role of Human Risk Management
By: CultureAI
Type: White Paper
Cybersecurity is increasingly volatile. Traditional measures fail against threats from human error and changing workplaces. Employees are now the perimeter, with data across SaaS and collaboration tools.
This report predicts 2025's top 5 cybersecurity threats: employee-driven mistakes, undetectable threats, and declining security training. It highlights Human Risk Management (HRM) as a key solution.
HRM uses technology to detect and mitigate risks in SaaS, messaging, phishing, and AI tools. By adopting HRM, organizations can reduce risks, enhance security, and adapt to threats.
Read the report to learn how HRM can build a resilient security posture.
Find more content like what you just read:
-
Insights from security operations 2024 report: Navigating evolving threats
By: Arctic Wolf
Type: Research Content
This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.
-
CW ASEAN: Preparing for 5G
By: TechTarget ComputerWeekly.com
Type: Ezine
As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
-
Cyber Security & Enterprise Networking Customer Engagements
By: Bytes
Type: White Paper
Discover how to secure remote access and build user trust with Bytes' comprehensive cybersecurity solutions. Download this e-book to learn about their end-to-end security methodology and customer engagements.
-
Enhance your cybersecurity resilience with comprehensive solutions
By: FCN
Type: eBook
To ensure strong security in the evolving cyberthreat landscape, your organization must prioritize cyber resilience. Here to help you do so is this 10-page eBook, "Empowering Cybersecurity Resilience: Comprehensive Solutions for Modern Threats." Tap into the book to learn about the pillars of cyber resilience, best practices and more.
-
E-guide: DevOps trends in APAC
By: TechTarget ComputerWeekly.com
Type: eGuide
Across the APAC region, organisations have been ramping up on agile development efforts to stay ahead of the competition. DevOps, in particular, has been gaining ground as a way to bring together development and operations teams, thereby increasing software quality and stability, and shortening time to market.
-
2024 Security State of the Union
By: Core BTS
Type: White Paper
This white paper examines the evolving cybersecurity landscape, including AI-powered attacks, supply chain vulnerabilities, and IoT security challenges. It outlines key trends, best practices, and industry-specific concerns. Read on to gain insights into the future of cybersecurity and learn how you can strengthen your security posture.
-
2024 threat landscape: 36-page report
By: Arctic Wolf
Type: Research Content
Ransom demands are increasing 20% year-over-year, “Artic Wolf Labs Threat Report 2024” finds, rising to a staggering $600,000 USD. How can you defend your business against that dangerous trend? And what other threats should you watch out for in the cyber landscape? Dig into the report to unlock insights.
-
How do you solve a problem like security training?
By: TechTarget ComputerWeekly.com
Type: eGuide
In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Insights on Privileged Access Management for MSPs in 2024
By: CyberQP
Type: White Paper
Explore the growing privileged access management landscape for MSPs. Learn how to secure remote access, manage identity-based threats, and align with compliance requirements. Download the full white paper to discover insights and recommendations for your MSP business.
-
Top AI attack tactics and mitigations
By: Amazon Web Services
Type: White Paper
Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
-
Top AI attack tactics and mitigations
By: Amazon Web Services
Type: White Paper
Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
-
A Guide to Protecting Small and Medium Businesses from Modern CyberThreats
By: CrowdStrike
Type: eBook
In today's digital world, small and medium-sized businesses (SMBs) face significant cyber risks,often lacking the resources and expertise to fully defend against sophisticated attacks. This guide will help you understand the landscape of modern cyberattacks and provide actionablesteps to safeguard your business.
-
Zscaler ThreatLabz 2024 Phishing Report reveals evolving threats
By: Zscaler
Type: Research Content
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
-
Bitdefender penetration testing services
By: Bitdefender
Type: Product Overview
Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
-
A 5-step plan to dramatically increase your security posture
By: Checkpoint Software Technologies
Type: White Paper
Today’s threat landscape is unlike anything seen before. This white paper looks at the current threat landscape, analyzing what the unprecedented scope of threats means for modern security, and providing 5 key security measures that you can implement to better prepare against ransomware and other attacks. Read on to discover more.
-
Preventing identity theft in a data breach
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
-
Cyberthreat Predictions for 2025
By: Fortinet, Inc.
Type: Essential Guide
This threat predictions report examines how long-term cyberattack trends evolve, shares emerging threats to watch for in 2025, and more. Read on now to learn how Fortinet expects the threat landscape to change in the coming year and beyond and how these shifts will impact organizations and their security teams.
-
New report reveals cybercrime's growing threat to national security
By: Google
Type: White Paper
This white paper explores cybercrime as a national security threat, examining its impacts, support of state-sponsored activities, and effects on critical infrastructure. It analyzes the evolving cybercrime ecosystem and offers recommendations for a comprehensive approach. Read the full paper to grasp the complexity of this issue.
-
Multi-pronged approach to cyber security professional development
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
-
Navigating The Complex World Of NIS2 With Microsoft Security Solutions
By: Orange Cyberdefense
Type: White Paper
The European NIS2 directive aims to harmonize cybersecurity requirements across the EU. Learn how Microsoft Security solutions can help your organization meet NIS2 compliance, from risk management to incident response. Read the white paper to prepare for the new regulations.
-
-
Defend against these top threats to your security
By: Advanced
Type: Research Content
Along with highlighting trends and major risks in cybersecurity in 2023, this report maps out 5 best practices for security success. #1: Reduce your attack surface by segmenting your network and removing any SaaS applications that are no longer necessary for your organization. Continue on to uncover the rest.
-
Email security: Never more important
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Evaluate endpoint security solutions with these 11 criteria
By: Malwarebytes
Type: White Paper
This e-book provides a comprehensive guide to evaluating endpoint security solutions. It covers 11 critical criteria for effective protection, including preventing zero-day threats, blocking phishing and ransomware, and ensuring low performance impact. Read the full guide to learn how to select the right endpoint security for your organization.
-
What is Incident Response? Plans, Teams and Tools
By: AT&T Corp
Type: eGuide
Many experts use the terms incident response and incident management interchangeably, but the two are hardly the same. So, what is incident response? And what are the essential elements you need to know for protecting your organization? Read this e-guide to find out.
-
Incident Response Report 2024: Insights to Strengthen Your Defenses
By: Palo Alto Networks
Type: Research Content
This Incident Response Report from Unit 42 by Palo Alto Networks provides insights into the latest threat actor tactics, techniques, and targets. Learn how to enhance your security posture, detect threats faster, and respond more effectively. Read the full report.
-
57 Tips to Proactively Prepare
By: Palo Alto Networks
Type: White Paper
Explore 57 actionable tips to proactively prepare your organization for cybersecurity threats. This comprehensive checklist covers identity and access management, risk management, data security, and more. Read the full white paper to strengthen your security posture.
-
Security Think Tank Christmas Special - The most important lessons of 2021
By: TechTarget ComputerWeekly.com
Type: eBook
In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
-
Create tailored phishing simulations for your employees
By: StarHub
Type: Webcast
Just like in healthcare, prevention is often the best medicine for cybersecurity.In this on-demand webinar, explore all the benefits and features of Cyawareness, including their massive educational video catalogue and attack simulation library so you can create tailored phishing simulations.
-
Elevate your cybersecurity with continuous threat monitoring
By: NetSPI
Type: Product Overview
NetSPI offers a platform for continuous threat exposure management, integrating penetration testing, attack surface management, and breach simulation. With expert security testing and advanced tech, NetSPI helps organizations identify, prioritize, and mitigate vulnerabilities. Learn how NetSPI's approach can enhance your cybersecurity posture.
-
With Ransomware Resurging, Enterprises need new strategies
By: Hewlett Packard Enterprise
Type: White Paper
Ransomware attacks are resurging, and attackers are increasingly using AI to generate sophisticated phishing emails that evade detection. Download this white paper now to learn how you can leverage modern recovery tools to strengthen ransomware defense for your business and restore data in hours, not weeks.
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Analyst report: Security goals & decision-making tips
By: ARG, Inc.
Type: Analyst Report
Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
By: TechTarget ComputerWeekly.com
Type: eGuide
Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
Strategies for Strengthening Data Protection in the Workplace
By: Ahlan Cyber
Type: White Paper
Explore strategies to balance data privacy and collaboration in the workplace. Discover best practices for employee training, secure file sharing, compliance, and future-proofing collaboration. Download this resource to learn how to protect sensitive data and reduce cyber threats.
-
154-pg e-book: A guide to activating your cyber defense
By: Google
Type: eBook
By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
-
CW EMEA - January 2023: Protecting the privacy of schoolchildren
By: TechTarget ComputerWeekly.com
Type: Ezine
In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
-
Build a better cybersecurity defense: How AI & automation can help
By: Deep Instinct
Type: Research Content
Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.
-
Discover the growing importance of external attack surface mgmt
By: Outpost24
Type: White Paper
This white paper explores External Attack Surface Management (EASM), a crucial cybersecurity component. It covers EASM's importance, key features, and how it differs from traditional vulnerability scanners. Learn about asset discovery, automated security analysis, and risk-based prioritization to enhance your cyber risk management strategy.
-
290-page report on the threat landscape
By: Comcast Business
Type: Research Content
Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
-
CW Middle East - October-December 2022: Qatar strengthens cyber defences ahead of FIFA World Cup
By: TechTarget ComputerWeekly.com
Type: Ezine
Being the first Arab country to host the World Cup is pressure enough on Qatar, but there is also a massive cyber security challenge associated with any event of this magnitude. Read about its preparations. Also in this issue, find out about the unique challenges of hiring IT professionals in Saudi Arabia.
-
Ensuring NIS2 compliance with privileged access management
By: One Identity
Type: White Paper
As the NIS2 Directive expands the scope of cybersecurity requirements, privileged access management (PAM) is crucial for compliance. Learn how PAM can help organizations mitigate risks, respond to incidents, and meet NIS2 obligations in this comprehensive white paper.
-
In 2017, the insider threat epidemic begins
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Computer Weekly 9 April 2019: Using data science at Sainsbury's
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
-
Insights on the Rising Mobile Threat Landscape in 2024
By: StarHub
Type: Research Content
The 2024 Global Mobile Threat Report examines the evolving mobile threat landscape, highlighting risks like mishing, mobile malware, sideloaded apps, and platform vulnerabilities. With a mobile-first attack strategy, enterprises must secure mobile devices and apps to protect data. Read the report to build a comprehensive mobile security strategy.
-
The CyberArk 2024 Identity Security Threat Landscape EMEA Report
By: CyberArk
Type: Research Content
The CyberArk 2024 Identity Security Threat Landscape EMEA Report is based on a survey of 1,050 security decision-makers. This year’s report examines identity security in the age of GenAI, machine identities and digital ecosystems. Read on now to learn why organizations must reconsider how, where and when to safeguard their data.
-
Best practices for enhancing cybersecurity with automation
By: Bitdefender
Type: eBook
Streamlining security operations with automation and XDR can enhance efficiency, reduce risks, and empower security teams. In this e-book, you'll learn how to simplify incident response, leverage XDR, and implement best practices to strengthen your cybersecurity posture. Read on now to learn more.