You've requested...

Download this next:

Shields up! Why Russia's war on Ukraine should matter to security pros

The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

- Prepare, but don’t panic, over supposed Russian cyber threat

- No imminent cyber threat to UK from Russia

- Why security professionals should pay attention to what Russia is doing

- New wave of cyber attacks on Ukraine preceded Russian invasion

- SunSeed malware hits those involved in Ukraine refugee relief

- Ukraine cyber attacks seen spiking, but no destructive cyber war yet

- Direct action is a risky business for Ukraine's volunteer hackers

- Use of encrypted Telegram platform soars in Ukraine, Russia

These are also closely related to: "Cyber Resiliency Assessment"

  • CW ASEAN: Time to dial up defences

    With a relatively young and tech-savvy population, ASEAN has been at the forefront of technology adoption. Yet, this has exposed its people and businesses to more cyber threats, including the massive data leak in Malaysia in 2017. In this month’s issue of CW ASEAN, we take a closer look at ASEAN’s patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

     

    Also in this issue:

     

    How some of the biggest cyber security disasters could have been avoided

    The headline-grabbing breaches that hit Accenture and Equifax in 2017 could have been averted had basic cyber hygiene been in place, as could a major DDoS attack that brought down the US internet.

     

    Malaysia partners with China’s Huawei to coordinate cyber security strategy

    Joint steering committee will meet twice a year to address cyber security issues, among other measures to shore up Malaysia’s cyber security capabilities.

     

    Taking the complexity out of security

    The key to improving the cyber security posture of organizations is to keep complexity at bay, says Eric Lam, Asia director for Microsoft’s Enterprise Cybersecurity Group.

  • Building the Business Case for Quantifying Cyber Risk

    It's the cybersecurity question every executive and board member wants — and needs — to have answered: How much will it cost if a cybersecurity risk materializes and causes a breach?

    Provide the answer with confidence by tying cyber threats to business impact using cyber risk quantification.

    Download LogicGate's new guide, “Building the Business Case for Quantifying Cyber Risk,” to learn how to:

    • Add financial context to risk decisions.
    • Get your organization onboard with cyber risk quantification and ensure successful implementation.
    • Stay on top of cyber threats and bolster operational resiliency.

Find more content like what you just read:

  • Tanium for Cyber Insurance

    Managing and protecting the thousands of devices that are connected to your network has never been more challenging. Cyber insurance is a key tool to mitigate the associated risks. Explore 10 steps for assessing cyber risk for cyber insurance when you download this guide.

    Download

  • Protecting the IT attack surface while advancing digital transformation

    To survive and to thrive, organizations must continue innovating, launching new products and services, and optimizing old ones. As a result, every organization’s attack surface will continue to change and, likely, grow. Learn how business leaders can keep up with these changes in this latest technical deep dive from Tanium experts.

    Download

  • SME cyber security is increasingly a business imperative

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

    Download

  • Cyber Liability Insurance

    Like health insurance, cyber insurance is a line of coverage designed to mitigate losses from cyber incidents. This white paper looks at how cyber insurance can help in the case of a cyber incident, highlighting how security controls such as MFA and endpoint security can bolster the effects of insurance, and lower rates. Read on to learn more.

    Download

  • Equip Your Team Against Cyber Threats with Full Training

    Emulate real-world cyber threats to train and prepare your security team. The SimSpace platform enables comprehensive training in a realistic production environment, with adversary emulation, performance analytics, and collaborative learning. Read the full product overview to learn how you can enhance your team's cyber readiness.

    Download

  • CW ASEAN: Trend Watch – Security

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

    Download

  • Top 10 ANZ IT stories of 2022

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

    Download

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

    Download

  • A buyers guide to cyber insurance

    With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.But with so many classifications and options, how do you know what to look for? This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution. Download now to learn more.

    Download

  • 2024 LevelBlue Futures™ Report: Cyber Resilience

    This 2024 research uncovered the relationships between the barriers to cyber and cybersecurity resilience and how the business prioritizes them. Get your copy of the report to learn what’s on the horizon that may impact cyber resilience, five steps for prioritizing cyber resilience, and more.

    Download

  • Top 10 cyber security stories of 2019

    2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.

    Download

  • The CISO's guide to supply chain security

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

    Download

  • Top APAC security predictions for 2020

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

    Download

  • Policing cyber crime

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

    Download

  • Focus ASEAN: Security & Digital Transformation

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

    Download

  • Royal Holloway: Corporate under-reporting of cyber crime

    Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.

    Download

  • The Top Cyber Security Trends in ASEAN in 2017

    For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.

    Download

  • Top 10 cyber security stories of 2021

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

    Download

  • Top 10 cyber crime stories of 2019

    Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.

    Download

  • Security Think Tank: Biden's Cyber Security Plan

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

    Download

  • Cybersecurity vs. cyber resilience: what's the difference?

    Dive into this e-guide for a comprehensive look at cybersecurity, cyber resilience, and why your organization needs a good handle on both if it is to survive the modern threat landscape.

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • February ezine: Look to the future

    An issue with plenty of predictions about what the year ahead holds for the channel

    Download

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

    Download

  • Creating the right habits for cyber hygiene success

    Remediating a cyberattack can be costly, so it’s a good thing that there’s an approach to cybersecurity that can help you avoid remediation. Enter strong cyber hygiene, a preventative security method that can save your organization money and time. Check out this blog to learn about the 4 tenets of successful cyber hygiene.

    Download

  • Identity Security: Why it Matters and Why Now

    It is no longer a question of if an organization will be hit by a cyber attack but a question of when. Read this paper to learn why Identity Security could be the key factor in preventing cyber attacks from happening.

    Download

  • 2024 security report: Predictions from 3 CISOs

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.

    Download

  • 4 ways to avoid gambling with cyber risk disclosure

    In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.

    Download

  • Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures

    Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.

    Download

  • Top trends shaping APAC's tech landscape in 2024

    While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.

    Download

  • The Ultimate Guide to Cyber Hygiene

    It’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.

    Download

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

    Download

  • A guide to determining the best cyber resilient protection for all your hybrid cloud workloads

    In this e-book, discover the secrets to navigating the challenges of hybrid cloud, and how to build a cyber resilience strategy for any cloud, any workload, anywhere.

    Download

  • Tech career guide: Cyber security

    In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.

    Download

  • Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...

    In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.

    Download

  • APAC career guide: Becoming a cyber security pro

    Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.

    Download

  • Essential Guide: APAC women in cyber security

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

    Download

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

    Download

  • Cyber security in the Nordics

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

    Download

  • MicroScope – February 2023: Opportunities in security

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

    Download

  • Seven Emerging Trends in Cyber Resilience

    As digital technologies evolve and enable more innovation, cyber attackers often keep pace. This report provides C-suite leaders the knowledge and critical understanding they need to successfully navigate the complex, rapidly evolving cybersecurity landscape.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?

    According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.

    Download

  • Manchester United praised for swift response to cyber attack

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

    Download

  • Security Think Tank Christmas Special - The most important lessons of 2021

    In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.

    Download

  • Improve cyber risk management operations for your organization

    Cyber risks demand effective management. This white paper examines cyber risk operations, identifying capabilities to advance threat visibility, align threats with critical assets, and enable risk-based decisions. It provides a methodology and framework to continuously improve risk mitigation. Read now to enhance your cyber risk program.

    Download