Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021
|
|
|
Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020
|
|
|
RSA Conference 2020 guide: Highlighting security's human element
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.
Posted: 08 Feb 2021 | Published: 04 May 2020
|
|
|
Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019
|
|
|
Security Analytics:A popular addition to cyber defence arsenals
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 08 Feb 2021 | Published: 09 Oct 2017
|
|
|
CW ASEAN November 2016
sponsored by TechTarget Security
EZINE:
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 08 Feb 2021 | Published: 31 Oct 2016
|
|
|
BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016
|
|
|
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016
|
|
|
Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|
|
Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER:
Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008
|
|
|
Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST:
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008
|
|
|
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER:
Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007
|
|
|
Products of the Year 2006
sponsored by Information Security Magazine
JOURNAL ARTICLE:
As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.
Posted: 10 Aug 2006 | Published: 01 Feb 2006
|
|