Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Demystifying Initial Access Brokers (IABS) and Their Links to Ransomware
sponsored by Outpost24
WHITE PAPER:
This white paper examines the role of Initial Access Brokers in cybercrime, detailing how they obtain and sell corporate network access to ransomware groups. It analyzes access sales on forums, pricing trends, and the relationship between IABs and ransomware operators. Read the full white paper to understand this critical cybersecurity threat.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
The Rising Threat of Traffers
sponsored by Outpost24
RESEARCH CONTENT:
This report examines the threat of traffers - cybercriminal groups focused on credential theft. It explores their structure, tools, and impact on underground markets. Learn how traffers operate, spread malware, and profit from stolen data. Read the full report to understand this threat and get recommendations for protecting your organization.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Unlocking Business Potential
sponsored by AWS
EBOOK:
Discover how to maximize the benefits of AWS through DataArt's proven migration and modernization services. Explore the key drivers, advantages, and best practices for a successful cloud transformation. Read the full e-book to learn how you can accelerate your AWS journey.
Posted: 06 Feb 2025 | Published: 06 Feb 2025
|
|
|
Specops Breached Password Report 2025
sponsored by SpecOps and Outpost24
RESEARCH CONTENT:
This report analyzes over 1 billion malware-stolen passwords, revealing alarming trends. Despite security awareness, users still create weak passwords like "123456" and "admin." Read on to examine how malware like Redline, Vidar, and Raccoon Stealer could impact organizations like yours and the current password security trends therein.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020
|
|
|
Zimperium Global Mobile Threat Report 2024
sponsored by StarHub
RESEARCH CONTENT:
The 2024 Global Mobile Threat Report examines the evolving mobile threat landscape, highlighting risks like mishing, mobile malware, sideloaded apps, and platform vulnerabilities. With a mobile-first attack strategy, enterprises must secure mobile devices and apps to protect data. Read the report to build a comprehensive mobile security strategy.
Posted: 20 Feb 2025 | Published: 20 Feb 2025
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Threat Report H2 2024
sponsored by ESET
ANALYST REPORT:
This threat report examines key cybersecurity trends in H2 2024, including the rise of RansomHub as the leading ransomware-as-a-service, a surge in cryptostealers, and new mobile phishing tactics using PWAs. It also covers infostealer landscape shifts and emerging scams targeting online bookings. Read the full report for comprehensive insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025
|
|
|
Computer Weekly - 8 February 2022: Exploring the metaverse
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
Posted: 04 Feb 2022 | Published: 08 Feb 2022
|
|