In 2017, the insider threat epidemic begins
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
Posted: 08 Feb 2021 | Published: 28 Feb 2017
|
|
|
Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017
|
|
|
Financial markets regulatory outlook 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 08 Feb 2021 | Published: 20 Jan 2017
|
|
|
Protecting your organisation from itself
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 08 Feb 2021 | Published: 06 Jan 2017
|
|
|
Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017
|
|
|
Threat management: Essential guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 08 Feb 2021 | Published: 25 Nov 2016
|
|
|
Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Nov 2016
|
|
|
Trouble at your door: targeted cyber attacks in the UK and Europe
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 08 Feb 2021 | Published: 29 Sep 2016
|
|
|
Focus: Securing new technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.
Posted: 08 Feb 2021 | Published: 29 Sep 2016
|
|
|
Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016
|
|
|
Focus: IT Security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.
Posted: 08 Feb 2021 | Published: 16 Sep 2016
|
|
|
Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016
|
|
|
BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE:
It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016
|
|
|
Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016
|
|
|
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016
|
|
|
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 08 Feb 2021 | Published: 26 Jul 2016
|
|
|
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016
|
|
|
Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016
|
|
|
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER:
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
VIPRE Takes A Bite Out Of Bloatware
sponsored by Sunbelt Software
WHITE PAPER:
Sunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO:
Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009
|
|
|
Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE:
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009
|
|
|
Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI)
sponsored by Gigamon
WHITE PAPER:
Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.
Posted: 01 Jul 2009 | Published: 01 Jul 2009
|
|