Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020
|
|
|
Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018
|
|
|
Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE:
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023
|
|
|
A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019
|
|
|
Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
Traditional Threat Management vs. AI-Driven Threat Intelligence
sponsored by Bottomline Technologies, Inc.
EGUIDE:
As traditional antivirus programs and intrusion detection systems become ineffective against ransomware and advanced persistent threats, it’s become imperative for organizations to take proactive approaches – such as AI-driven threat intelligence. Take the survey to access Traditional Threat Management vs. AI-Driven Threat Intelligence.
Posted: 10 Dec 2021 | Published: 25 Oct 2021
|
All resources sponsored by Bottomline Technologies, Inc.
|
|
Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT:
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009
|
|
|
Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING:
The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|