Distributed Denial of Service Attacks Reports

10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com

CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019

TechTarget ComputerWeekly.com

Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software

Computer Weekly – 6 August 2024: Migrating to S/4Hana – how the Co-op made its move
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's ezine, as SAP users prepare for the deadline to move off the ECC platform, we find out how Co-op is migrating to S/4Hana. Our latest buyer's guide looks at how to manage SaaS and on-premise software licensing. And we talk to former NCSC CEO Ciaran Martin about the true risks of nation-state cyber attacks. Read the issue now.
Posted: 02 Aug 2024 | Published: 06 Aug 2024

TechTarget ComputerWeekly.com

Computer Weekly – 17 December 2024: Technology on the beat
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the future of technology in policing as the Home Office announces plans for a new IT organisation. We look at the security risks from employees using publicly available generative AI tools in the workplace. And we hear how Hyatt Hotels is creating a data culture across the organisation. Read the issue now.
Posted: 16 Dec 2024 | Published: 17 Dec 2024

TechTarget ComputerWeekly.com

6 Steps for Improving Visibility in Your Complex Tech Landscape
sponsored by Splunk
EBOOK: In the vast expanse of your company’s complex tech environment, comprehensive visibility isn't just a luxury; it's a necessity. In this guide, you’ll discover specific steps you can take to illuminate this treacherous terrain. The strategies in this guide will help your organization boost efficiency, lower MTTx and become more resilient.
Posted: 25 Oct 2024 | Published: 25 Oct 2024

Splunk

Inside Grab's platform strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Grab's group CTO talks up the super app's platform strategy, architecture and organisational structure behind its growth across diverse Southeast Asian markets
Posted: 17 Nov 2024 | Published: 18 Nov 2024

TechTarget ComputerWeekly.com