10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022
|
|
|
CW APAC buyer's guide to cloud security
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
Posted: 08 Feb 2021 | Published: 07 Mar 2019
|
|
|
Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017
|
|
|
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER:
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007
|
|
|
Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE:
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Computer Weekly - 10 September 2024: The flight to data success
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.
Posted: 09 Sep 2024 | Published: 10 Sep 2024
|
|
|
2025 Media Consumption and Vendor Engagement Study(UKI)
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE:
TechTarget and Enterprise Strategy Group are conducting research to better understand the current state of content and research preferences throughout the purchase journey in organizations. We highly value your input and appreciate your time - it helps us improve our coverage for you and your peers.
Posted: 20 Dec 2024 | Published: 20 Dec 2024
|
|
|
Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER:
In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|
|
IT Salaries & Careers Infographic UK
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
This year, TechTarget and Enterprise Strategy Group's research division conducted an in-depth study—based on real technology professionals' input—to determine major trends in employment, perks, and staffing in the United Kingdom. Download the infographic to absorb the study's results and to benchmark your career experience against your peers'.
Posted: 16 Sep 2024 | Published: 16 Sep 2024
|
|