In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
Botnet attacks will expand and evolve. The best way to fight back is to stop searching for the perfect botnet-protection tool and layer defenses instead.
There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.
In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.
View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.