10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022
|
|
|
Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022
|
|
|
Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022
|
|
|
Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022
|
|
|
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
Posted: 09 May 2022 | Published: 10 May 2022
|
|
|
BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK:
After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022
|
|
|
Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.
Posted: 08 Nov 2021 | Published: 09 Nov 2021
|
|
|
Infographic: Ransomware timeline
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Ransomware isn't anything new, but it remains a major challenge for individuals, companies, governments and organizations. In this infographic, we take a look at some of the most notable examples of ransomware from the past 30-plus years here.
Posted: 03 Nov 2021 | Published: 03 Nov 2021
|
|
|
CW APAC, October 2021: Tech Career Guide
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021
|
|
|
Password Security Guidelines
sponsored by Informa TechTarget
RESOURCE:
In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019
|
|
|
How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE:
The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021
|
|
|
Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
Posted: 01 Aug 2021 | Published: 03 Aug 2021
|
|
|
CW APAC – July 2021: Trend Watch: Supply Chain Security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
Posted: 09 Jul 2021 | Published: 09 Jul 2021
|
|
|
The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021
|
|
|
Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021
|
|
|
Infographic: 5 ways backup can protect against ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.
Posted: 05 May 2021 | Published: 06 May 2021
|
|
|
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021
|
|
|
Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021
|
|
|
Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
CW APAC, July 2020: Trend Watch: Security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 08 Feb 2021 | Published: 09 Jul 2020
|
|
|
Royal Holloway: Man proposes, fraud disposes
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020
|
|
|
False cents of security: The price of being compromised
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 08 Feb 2021 | Published: 03 Jun 2020
|
|
|
Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 May 2020
|
|
|
Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 08 Feb 2021 | Published: 20 Apr 2020
|
|
|
Top IT Predictions in APAC 2020
sponsored by TechTarget ComputerWeekly.com
DATA SHEET:
As the new decade dawns, we wanted to look ahead at the technologies likely to dominate the Asia-Pacific IT landscape in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020
|
|