Malicious Cryptominers Want to Hijack Your Resources
By: Verizon View more from Verizon >>
Download this next:
Malware Exploitation of Machine Identities
By: Venafi & Intel
Type: Resource
Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade.
Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.
These are also closely related to: "Malicious Cryptominers Want to Hijack Your Resources"
-
The State of Encrypted Attacks ThreatLabz Report
By: Zscaler
Type: Research Content
What's Hiding in Your Web Traffic?
A vast majority of today's cyberattacks use encryption to bypass defenses. The Zscaler ThreatLabz team analyzed data from the world's largest security cloud—processing over 250 billion transactions per day—to uncover what threats are hiding in SSL/TLS.
Learn how the encrypted threat landscape has evolved and what you can do about it in the recent ThreatLabz report, The State of Encrypted Attacks. You’ll discover what was learned from analyzing encrypted traffic across the Zscaler cloud from Oct 2021-Sept 2022, blocking 24 billion threats over HTTPS along the way. A 20% increase from the 20.7 billion threats blocked in 2021.
-
Cloud Growth vs. Cloud Security Incidents
By: Palo Alto Networks
Type: Analyst Report
As the COVID-19 Pandemic accelerated businesses’ move to the cloud, cloud security incidents for the retail, manufacturing, and government industries rose by 402%, 230%, and 205%, respectively, according to Palo Alto Networks’ research.
Companies who rapidly moved to the cloud without automated security controls in place have faced serious vulnerabilities. The following report details the scope of current cloud threats and identifies actionable steps your organization can take to reduce risks.
Access this cloud security report to learn which security controls companies have neglected to invest in and what risks are most pressing in your specific industry and geography.
Find more content like what you just read:
-
Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
By: Venafi & Intel
Type: White Paper
Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.
-
Compare 3 Leading SASE Solutions
By: Palo Alto Networks & Insight
Type: Analyst Report
SASE solutions aim to simplify system management by allowing IT administrators to easy manage all the necessary security measures and access permissions from a single cloud-based management architecture. Tap into this comparative report of SASE offerings by Palo Alto Networks, Cisco and Zscaler broken down by 8 sub-tests.
-
SASE put to the test: Top tools and vendors, compared
By: Palo Alto Networks
Type: eBook
To find out how three SASE products – Cisco Umbrella, Palo Alto Networks Prisma Access Enterprise and Zscaler Internet Access – stack up against each other, read this 20-page report by AV Comparatives.
-
Enterprise Strategy Group evaluates ransomware detection methods
By: Intel
Type: ESG Showcase
ESG analysts recommend combining software security tools with hardware-based threat detection to prevent ransomware attacks. Read this ESG Showcase to find out how hardware-based detections work, and to view a potential solution in Intel Threat Detection Technology integrated with Check Point Harmony for comprehensive endpoint protection.
-
CDR in 2023: Enterprise Strategy Group (ESG) report
By: AT&T
Type: ESG Research Report
In the next twelve months, 89% of organizations surveyed by Enterprise Strategy Group (ESG) plan to increase their cloud detection and response (CDR) spending substantially or at least slightly. So, why is this the case? For a deep dive on the state of CDR in 2023, review this 32-page ESG research report.
-
Cloud NGFW: Best-in-Class Security, Unparalleled Simplicity on AWS
By: Palo Alto Networks
Type: Product Overview
Amazon Web Services (AWS) and Palo Alto Networks have introduced Cloud NGFW. Tap into this e-book to learn how to deploy next-generation protection quickly and easily.
-
SWG: Answering FAQs
By: Nomios
Type: eBook
To battle proliferating web-based threats, many organizations have adopted a secure web gateway (SWG) in order to filter malicious content. For leaders interested in augmenting their SWG knowledge, this e-book can serve as a comprehensive guide. Tap into the book to unlock answers to FAQs about SWGs.
-
Top 10 IT security stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
-
CW ANZ, July 2020: Expert Advice on Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
CW Nordics: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: eGuide
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
CW Nordics - August-October 2020: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: Ezine
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
Enterprise Strategy Group report: How digital helps SMBs
By: Intel Software
Type: ESG Research Report
Findings from Enterprise Strategy Group (ESG) research indicated that 52% of midmarkets believe IT is more complex than it was just 2 years ago. Fortunately, Intel, Dell, and Microsoft have partnered to deliver a solution that can help SMBs get a grip on security while increasing productivity. Download your copy of this ESG report to learn more.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
Cybersecurity solutions built for today’s cloud-centricity
By: Palo Alto Networks
Type: Product Overview
According to Gartner, by 2025, 95% of new digital workloads will be on cloud-native platforms. With organization’s moving rapidly to the cloud there is a fresh demand for modern cybersecurity. Read this product overview to learn about Palo Alto’s Cloud Next Generation Firewall (NGFW), an offering designed to meet today’s cloud-centric demands.
-
Top 10 CI/CD security risks you can't ignore
By: Palo Alto Networks
Type: eBook
Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.
-
Top 10 datacentre stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.
-
SecOps: Automate the repetitive things you do every day to ease
By: Palo Alto Networks
Type: White Paper
Within your SOC, how much time a day is spent dealing with repetitive tasks? Automating these repetitive, low-skill activities can free up valuable time so you can focus on the critical threats, and proactively refine your defenses against the next attack. This white paper explores 10 ways you can automate your SOC. Read on to learn more.
-
Australia's cybersecurity game plan
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
CW Benelux February 2018
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
-
MicroScope - May 2019: Packaged services the global shift towards virtual distribution
By: MicroScope
Type: Ezine
In this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.
-
Computer Weekly 30 April 2019: Inside Huawei
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.
-
Benelux focus: Moving to the cloud
By: TechTarget ComputerWeekly.com
Type: eGuide
We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.
-
Computer Weekly – 14 August 2018: Infrastructure under attack
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
-
Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
-
The CISO's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.
-
Reduce phishing & ransomware risk
By: Mimecast
Type: Analyst Report
Is your organisation prepared for phishing or ransomware to pounce at any moment? Access this Osterman Research report to look at these two threats up close to examine how they’ve affected security in the past year and a half and to study how the risks of both can be reduced.
-
February ezine: Look to the future
By: MicroScope
Type: Ezine
An issue with plenty of predictions about what the year ahead holds for the channel
-
Is AI coming for YOUR job? (Spoiler alert: No!)
By: Oversight Systems
Type: White Paper
While AI and automation can seem like scary, job-stealing technology, some organizations, and financial teams are finding that it’s the exact opposite. However, most companies aren’t completely convinced. Browse this white paper to learn more.
-
Your 48-page primer to understanding DevSecOps
By: VMware Tanzu
Type: eBook
DevSecOps is about making security an inextricable, if not intrinsic, part of the application lifecycle to support increasingly complex, cloud-native applications. But where do you start? Begin by downloading a copy of this comprehensive DevSecOps for Dummies e-book, in which you’ll find helpful definitions and how-tos.
-
Top MITRE ATT&CK techniques from criminal/APT groups
By: McAfee
Type: Research Content
Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
-
MITRE ATT&CK, a guide for businesses in 2022
By: TechTarget ComputerWeekly.com
Type: eBook
Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
urllib3: Secure Development Practices and Python Supply Chain Impact
By: Tidelift
Type: Case Study
Discover in this case study how every user of software that adopts a few simple practices and standards can benefit from the behind-the-scenes work that the urllib3 team has done.
-
Computer Weekly 19 March 2019: How IT leaders should work with marketing
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.
-
Case Study: How supercomputing is transforming experimental science
By: TechTarget ComputerWeekly.com
Type: eGuide
NERSC lead data scientist Debbie Bard talks about how large-scale data analytics using super computers is making new types of science possible
-
Enabling reliable data protection in a remote world
By: Cobalt Iron
Type: Product Overview
How confident are you in your ability to keep your data protection stable and secure – and do so remotely? Read on to learn how you can enable a single, simplified view that provides details on the health of your data protection operations, regardless of what you are protecting or where it lives.
-
Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.
-
Cobalt Iron Compass: Data Protection for a Remote World
By: Cobalt Iron
Type: Data Sheet
With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
Top 10 network stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.
-
Top 10 datacentre stories of 2021
By: TechTarget ComputerWeekly.com
Type: eBook
The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.
-
CW ANZ: Gearing up for 5G
By: TechTarget ComputerWeekly.com
Type: Ezine
The potential benefits of 5G are certainly promising in Australia, which is seen as a test bed for 5G services with the country's dense cities and wide open spaces. In this edition of CW ANZ, we look at how Australia is ushering in 5G services and the industries that will get the most out of the technology. Read the issue now.
-
Where IT Meets Geology: What A Core Sample of Your Environment Can Tell You
By: Softchoice
Type: Blog
In this blog post, discover how, in the same way a geological core sample helps scientists reconstruct past climates and movements, sampling your IT environment can give you a much clearer picture of what’s happened and what’s still going on.
-
Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.