Spyware Threats Reports

CW APAC, July 2020: Trend Watch: Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 08 Feb 2021 | Published: 15 Jul 2020

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

Video: IT Priorities 2023 APAC
sponsored by TechTarget ComputerWeekly.com
VIDEO: Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Top APAC security predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

How long does it take to get owned?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com