You've requested...

Download this next:

Strengthen medical device cybersecurity with simulation technology

As medical devices advance, so do cybersecurity threats. The FDA mandates stronger protections for these devices.

This white paper shows how simulation tech can enhance cybersecurity in device software development. Key points:

  • Penetration testing and fault injection in simulations to find and fix vulnerabilities.
  • Simulating threats to test defenses.
  • Developing software in virtual environments for DevSecOps and ongoing testing.

Addressing cybersecurity early helps manufacturers protect against threats. Learn more about simulation for device security in the full paper.

These are also closely related to: "BlackBerry Smartphone Simulators"

  • Your guide to the leaders of the 2023 MITRE Engenuity ATT&CK Evaluations

    Since 2018, the ATT&CK Evaluations have provided the industry’s most sophisticated public attack simulations for security vendors to essentially “test their wares” against attack methodologies representative of real-world threats.

    In this year’s evaluation, only Palo Alto Networks prevented every step in the protection scenario and delivered an analytic detection in every substep of the two detection scenarios.

    In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    Container terminals (CTs) are the transportation nodes at which containerised freight is transhipped between ships and overland transport. CTs are a vital element of a country’s transportation infrastructure, and in the UK they are classed as part of the country’s critical national infrastructure.

    This article explains the dependence of modern CTs on IT and suggests that this dependence may pose a greater threat to CT operations than other comparable elements of CNI. This opinion is formed by examining the cyber-based threat actors who may be motivated to disrupt CT operations and the vulnerabilities they may seek to exploit.

    Finally, the article demonstrates how the impact of cyber attacks against CTs can be modelled using discrete event simulation techniques. It is suggested that the outputs from these simulations could be used to identify and prioritise vulnerabilities at CTs and support justifications for investment in new and improved control measures.

Find more content like what you just read:

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • How Illumio performs against simulated ransomware attacks

    In order to overcome ransomware, organizations need offerings that can handle the most dangerous malware. This paper presents the results of an array of attack simulations aimed at testing the security capabilities of Illumio’s Core offering. Read on to learn more about Illumio Core and see how it performs against emulated threats.

    Download

  • Computer Weekly – 2 April 2019: The nightmare driving test – making driverless cars safe

    In this week's Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments. Our latest buyer's guide looks at business intelligence and analytics. And we examine the implications of the EU's controversial new copyright laws. Read the issue now.

    Download

  • Penetration testing; Find vulnerabilities before hackers can

    Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.

    Download

  • Discover vulnerabilities & strengthen your security posture

    In this white paper, learn about how penetration testing can help you discover security weaknesses, evaluate response capabilities and get recommendations to strengthen your security posture.

    Download

  • Empower your workforce to combat cyber threats with training

    Empower your workforce to be your first line of defense against cyber threats with StarHub's Cybersecurity Awareness Training Platform. Learn how this AI-powered solution can help your organization combat phishing and protect critical assets. Read the full product overview to discover the key features.

    Download

  • How AllCloud can support your cloud journey

    Orion, a leading supplier of carbon black, wanted to migrate its highly complex simulations of chemical processes to the cloud. The company partnered with AllCloud to prepare the cloud journey, resulting in 20% faster calculations and improved manufacturing processes. Access the case study to explore how AllCloud can support your cloud journey.

    Download

  • 4 ways organizations can use digital means to fuel sustainability

    As the threats of climate change loom closer, sustainability is a necessity for any organization’s long-term streak. This white paper explores the current state of sustainability and provides 4 ways organizations can use digital means to fuel sustainability. Read on to learn more.

    Download

  • Quantum computing: What are the data storage challenges?

    Quantum computing will process massive amounts of information. But, to be fully effective, quantum computing will need to access, analyse and store huge amounts of data. One area, in particular, will have to deal with significant challenges: data storage. How will today's storage systems keep pace?

    Download

  • Develop custom firmware for Utimaco's hardware security solutions

    The utrust SDK is a professional development environment that enables custom firmware extensions for Utimaco's hardware security modules. It provides full control, efficient development, and qualified support to create tailored security solutions. Read the full details in this blog article.

    Download

  • Prepare for the quantum era with post-quantum cryptography

    Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • Digital drive: The IT backbone behind Lewis Hamilton's British Grand Prix win

    Dive into the world of the Mercedes F1 IT team, where advanced data analytics, real-time telemetry, and state-of-the-art simulations come together to fine-tune every race detail. Uncover how this seamless blend of technology and teamwork gave Lewis Hamilton the edge he needed to triumph at Silverstone.

    Download

  • Automate cyber risk management with an AI-powered platform

    The SAFE One Platform is an AI-powered, unified solution for managing first-party and third-party cyber risks. It provides real-time visibility, enables effective board reporting, justifies security budgets, and accelerates risk decisions. Read the full datasheet to learn how this platform can empower your cybersecurity efforts.

    Download

  • Simulate Real Attacks to Prepare Your Cybersecurity

    What if there was a way to simulate an attack to gain experience, without putting your organization at risk? Download this data sheet to learn how the SimSpace platform can help you model your production environment and continuously emulate real adversaries to test your defenses.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

    Download

  • CW@50: March editions of Computer Weekly

    We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.

    Download

  • Enable End-to-end Zero Trust To Achieve Effective Outcomes

    Illumio was highlighted as a leader in The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers report based on their current offering and strategy regarding end-to-end Zero Trust in the post-perimeter era. Read this report to learn more about Illumio’s offering and discover why Forrester gave it such high regards.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Top vendors in endpoint security heading into 2024

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

    Download

  • Guide to MITRE ATT&CK & endpoint security

    Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.

    Download

  • AI governance: The hidden secret for success

    As the volume of data continues to snowball and organizations increasingly adopt AI, the need for a robust data governance strategy has become even more critical for success. This e-book examines how a lakehouse architecture with unified data and AI governance can help. Read on to learn how you build customer trust for your business.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • How to tackle information overload

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

    Download

  • Workplace Revolution: How HR technology is transforming the way we work

    In this e-guide, we explore how businesses around the world are using advanced HR technology to transform the way we work and to improve the efficiency of the workplace. We focus on how advances in artificial intelligence, virtual reality and data analytics are helping to propel HR and the workplace into the future.

    Download

  • Focus: Artificial intelligence in the enterprise

    This special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.

    Download

  • CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment

    Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.

    Download

  • The Managed Detection & Response Landscape

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

    Download

  • Bluetooth Low Energy: The IoT battle

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

    Download

  • Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects

    In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.

    Download

  • 10 AI and machine learning trends

    Artificial intelligence technologies are transforming business processes and society at large. As enterprises expand the uses of AI, this field starts to move towards new domains, such as conceptual design, smaller devices and multi-modal applications. Here are 10 top 2022 trends IT leaders should prepare for now.

    Download

  • Endpoint Security Evaluation Guide

    Read this buyer’s guide to understand the 11 criteria by MRG Effitas that are considered vital for evaluating endpoint protection for efficacy, performance, and reliability.

    Download

  • Staying on top of your mobile device fleet 24/7

    Mobile devices are now an essential and integral part of the modern workplace enabling employees, contractors, and third-party vendors to access a wide variety of business-critical applications and data. Learn how a 360° mobile device management (MDM) helps you stay on top of your mobile device fleet 24/7.

    Download

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Rugged handheld computers purpose-built for healthcare

    Healthcare workers need to be employed with devices that are not only reliable but feature-packed, time-conservative and mobile. So, what can you expect when you purchase consumer smartphones — instead of rugged handheld computers purpose-built for healthcare? Download this infographic to find out.

    Download

  • 7 types of networks and their use cases

    A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.

    Download

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

    Download

  • Computer Weekly – 2 May 2017: How to deal with data under GDPR

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Accelerating Zero Trust Capabilities eBook

    The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.

    Download

  • UKtech50 2018: The 50 most influential people in UK IT

    In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.

    Download