Hackers Reports

Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
Posted: 18 Dec 2023 | Published: 19 Dec 2023

TechTarget ComputerWeekly.com

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly – 3 October 2023: Where next for quantum computing?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.
Posted: 02 Oct 2023 | Published: 03 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.
Posted: 15 Sep 2023 | Published: 19 Sep 2023

TechTarget ComputerWeekly.com

Computer Weekly – 1 August 2023: We're doing AI all wrong
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, AI is being imposed on society from the top down and the socio-economic implications will cause problems – we talk to an expert who says there is a better way. We also find out how hackers – the good kind – are turning to AI to make their work more effective. Read the issue now.
Posted: 31 Jul 2023 | Published: 01 Aug 2023

TechTarget ComputerWeekly.com

Computer Weekly – 25 July 2023: Getting comfortable with data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.
Posted: 25 Jul 2023 | Published: 25 Jul 2023

TechTarget ComputerWeekly.com

Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023

TechTarget ComputerWeekly.com

CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Identity trends for 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.
Posted: 01 Mar 2023 | Published: 02 Mar 2023

TechTarget ComputerWeekly.com

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

Top 11 cloud security challenges and how to combat them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Many organisations can't delineate where cloud service provider (CSP) responsibilities end and their own responsibilities begin, opening them to numerous vulnerabilities. This infographic will help you understand the top cloud security challenges your organisation is likely to face and how to mitigate them.
Posted: 21 Feb 2023 | Published: 21 Feb 2023

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Top 10 ANZ IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to anti-ransomware
sponsored by TechTarget ComputerWeekly.com
EBOOK: The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
Posted: 12 Dec 2022 | Published: 12 Dec 2022

TechTarget ComputerWeekly.com

Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TechTarget ComputerWeekly.com

10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com