Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022
|
|
|
Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE:
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020
|
|
|
Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019
|
|
|
Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019
|
|
|
Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018
|
|
|
Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016
|
|
|
Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009
|
|
|
Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE:
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009
|
|
|
Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST:
Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009
|
|
|
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER:
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009
|
|
|
Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO:
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009
|
|
|
Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO:
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009
|
|
|
Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER:
The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008
|
|
|
Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER:
This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008
|
|
|
Manage Risk and Address Return on Investment with IBM Compliance Solutions
sponsored by IBM Software Group
WHITE PAPER:
Governance, risk management and compliance place high expectations on IT to establish, enforce and prove the efficacy of policies, processes and controls.
Posted: 15 Feb 2008 | Published: 01 Mar 2007
|
|
|
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO:
Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007
|
|
|
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY:
This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006
|
|
|
Webroot Enterprise Spy Audit
sponsored by OpenText Security Solutions
TRIAL SOFTWARE:
Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006
|
|
|
Moving on Up
sponsored by Information Security Magazine
JOURNAL ARTICLE:
How do you rise in the security ranks? Don't speak geek; use the language of business.
Posted: 24 Aug 2006 | Published: 01 Jul 2006
|
|
|
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER:
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006
|
|