You've requested...

Enhance Security with Intel® vPro™ Technology

If a new window did not open, click here to view this asset.

Download this next:

Infographic: 4 types of ransomware

Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met.

Historically, the two main types of ransomware are crypto and locker. More recently, double extortion and ransomware as a service (RaaS) have become popular among threat actors.

In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

These are also closely related to: "Enhance Security with Intel® vPro™ Technology"

  • How intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

    Modern security mechanisms such as unified threat management (UTM), next-generation firewalls and security information and event management (SIEM) have become more sophisticated over recent years, promising advanced security features and immediate mitigation of the most advanced threats.

    While this appears promising, in practice even this cutting-edge technology often fails to protect modern organisations as they are being targeted by attacks that were previously unknown to the security industry. Most security mechanisms are based on a database of previously known attack artefacts (signatures) and they will fail on slightly modified or new attacks.

    The need for threat intelligence is in complete contrast with the way current security solutions are responding to the threats they identify, as they immediately block them without attempting to acquire any further information.

    In this report, we present and evaluate a security mechanism that operates as an intrusion prevention system which uses honeypots to deceive an attacker, prevent a security breach and which allows the potential acquisition of intelligence on each intrusion attempt. 

  • Cybersecurity resilience in an era of identity sprawl

    As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

Find more content like what you just read:

  • 13 steps for enabling secure remote work

    Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.

    Download

  • Bluetooth Low Energy: The IoT battle

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

    Download

  • Can you spot 5 myths about RASP?

    Can you separate RASP fact from fiction? This handy guide debunks the top 5 commonly-believed RASP myths. Put your AppSec knowledge to the test by reading on now.

    Download

  • CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering

    The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • A Computer Weekly buyer's guide to supply chain security

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

    Download

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

    Download

  • The ultimate guide to identity & access management

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Focus ASEAN: Enterprise Mobility

    With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.

    Download

  • 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

    Download

  • Data protection: A business imperative

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

    Download

  • January ezine: SD-WAN is taking off

    There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • Toughening up web and mobile application security

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

    Download

  • Share your tech purchasing decisions for 2024

    TechTarget and Enterprise Strategy Group are conducting this survey to understand how your technology research journey and your tech buying team have changed over the past two years.

    Download

  • CIO Trends #9: Middle East

    In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • CW Middle East July to Sept 2016:

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

    Download

  • Software-defined networking: Spotlight on ASEAN

    In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.

    Download

  • 2021 IT Priorities: APAC report

    Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.

    Download

  • How to achieve compliant communication

    Working closely with Microsoft, Theta Lake offers modern, AI-enabled compliance and security capabilities that enable organizations of all sizes to use the full breadth of Microsoft Teams capabilities. Download this white paper to learn more about Theta Lake’s approach to compliant communication.

    Download

  • Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success

    In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.

    Download

  • Multicloud by Design: The Modern Path to IT Simplicity, Agility and Control

    Access this site to learn how multicloud by design enables business and IT leaders to prioritize the technologies they need while reducing costs while maximizing control.

    Download

  • Passwordless: The future of authentication

    Passwordless authentication eliminates reliance on passwords and delivers a host of business benefits, including a better user experience, reduced IT time and costs and a stronger security posture. Download Passwordless: The Future of Authentication now and get started on your path to passwordless.

    Download

  • Infographic: Cybersecurity Hygiene Best Practices

    Cybersecurity hygiene is a critical component of any infosec program. Just as washing your hands and brushing your teeth are important to personal hygiene, password updates and software patches are important to cybersecurity hygiene -- and critical to preventing data loss, breaches and identity theft.

    Download

  • How remote connectivity platforms enable security

    Digital transformation and cloud-first strategies mean that connectivity has expanded beyond the traditional perimeter to enable access for employees, customers, and partners from anywhere.

    Download

  • Plow & Hearth's CX success with Five9

    Plow & Hearth, the home furnishing company, wanted to continue the legacy of their olden-time customer experience strategy in today’s cloud-based world. The company turned to InflowCX and Five9 for their CX and contact center needs. Access the case study to learn how Plow & Hearth was able to continue providing the CX they always valued.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures

    Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.

    Download

  • Guide to Flexible Working

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

    Download

  • IT/OT convergence is necessary, but not so simple

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

    Download

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • 10 AI and machine learning use cases in ITSM

    AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM

    Download

  • SIEM, SOAR or both? Our security experts weigh in

    In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).

    Download

  • European Perceptions, Preparedness and Strategies for IoT Security

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

    Download

  • Why zero trust is IT security's best hope

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

    Download

  • CW ASEAN: Time to dial up defences

    In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

    Download

  • Monitoring: Cut time between alert & analysis with automation

    How can your MSP leverage IT automation solutions like LogicMonitor to both improve internal operations and service delivery to your customers? Find out by downloading this white paper, which covers six ways MSPs can automate with LogicMonitor.

    Download

  • Get the Greatest ROI From Your Strategic Initiatives

    The most effective way to thrive through unprecedented change is to get ahead of it. Read this e-book to learn how you can transform your digital operations and maximize ROI by enabling effective project and portfolio management on a single platform.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • Data Platform: Unlock Flexibility in the Supply Chain

    While many recognize the importance of seamless supply chain operations for business success, siloed data makes it difficult to achieve. This product overview examines a data platform designed to complement your existing architecture to enable intelligent supply chain orchestration. Read on to learn how your business can wield it.

    Download

  • Getting Cloud Security Right

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

    Download