You've requested...

Download this next:

MicroScope – February 2022: Spotting the hidden security dangers

What’s in store for the channel in 2022?
In the first part of a two-part look at what lies ahead this year, Billy MacInnes reveals what many expect to be areas of interest in the next 12 months

What’s on the security radar?
Vendors share their thoughts about which technologies will be in demand this year. Simon Quicke reports

Security lessons learnt and what lies ahead
Neil Langridge, marketing director at e92plus, shares insights into what lessons the cyber security world can take from 2021 to better inform against threats in 2022

These are also closely related to: "Ransomware Defense: The Do's and Don'ts"

  • The state of the threat landscape

    The advent of AI as a tool has lowered the barrier of entry for attackers, only adding fuel to the fire that is the rapidly expanding threat landscape.

    With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats, including insight and observations into adversary activity:

    • The tactics and techniques that adversaries use to exploit gaps in cloud protection
    • The exploitation of stolen identity credentials
    • The growing menace of supply chain attacks
    • And much more

    Download the report now to learn more.

  • How modern endpoint security improves visibility and reduces risk

    Dark Reading's State of Endpoint Security Survey found that 84% of security pros believe any attack will start with the endpoint.

    This white paper aims to help security and IT professionals better understand the costs and risks of trying to make legacy endpoint security solutions effective in today’s threat environment.

    Download now to see why only a cloud-native approach to endpoint protection can provide the assets your security team needs to be successful, including:

    • Visibility
    • Intelligence
    • Scalability
    • And more

Find more content like what you just read:

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • 4 adversaries exploiting identities & how to stop them

    When hackers target your organization with phishing attacks and identity compromise threats, they are affectively forcing your workforce to act as your last line of defense. In this e-book, experts from CrowdStrike investigate the dangers of identity-based attacks, as well as how you can thwart them. Download now to learn more.

    Download

  • How identity protection fortifies the top entry point for adversaries

    Adversaries target identity and credentials because humans are easy to trick, credentials are like a master key, and identities are easy to monetize and span the entire enterprise. Download the eBook to learn how to combat these types of attacks with a combination of identity protection and threat intelligence.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • MicroScope – October 2021: Choosing a channel career

    In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference

    Download

  • CrowdStrike established visibility across 17,400 endpoints

    With 17,400 endpoints, Globe Telecom faced an up-hill battle establishing and maintaining visibility across attack surface. With help from CrowdStrike they immediately gained the visibility they needed, establishing a bedrock from which they could thwart endpoint threats and mitigate risk. Read on to learn more.

    Download

  • MicroScope – January 2022: Squaring up to ransomware

    In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead

    Download

  • Practical tips for securing your cloud infrastructure

    It’s hard to keep up with an increasing number of access patterns, SaaS apps, users, and cloud providers. So, how do you figure out the who, what, where, and how of your cloud security? Read on to dive into the most common cloud security threats and learn what you can do about them, including tips for getting started with cloud app security.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

    Download

  • Top 14 ransomware targets in 2023 and beyond

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

    Download

  • CISO Success Stories

    The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

    Download

  • MicroScope – March 2023: Steering the storage market

    In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.

    Download

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

    Download

  • How ASM weaknesses lead to security incidents

    Today’s organizations possess Internet-facing attack surfaces, filled with thousands of assets. Due to this growth in complexity, traditional attack surface management platforms (ASMs) are no longer sufficient. In this white paper, ESG analyze the demands of a modern-day attack surface and what is needed in an ASM offering. Read on to learn more.

    Download

  • Value drivers for an attack surface management (ASM) program

    Today’s organizations possess Internet-facing attack surfaces, filled with thousands of assets. Due to this growth in complexity, traditional attack surface management platforms (ASMs) are no longer sufficient. In this white paper, ESG analyze the demands of a modern-day attack surface and what is needed in an ASM offering. Read on to learn more.

    Download

  • Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex

    In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.

    Download

  • Surviving Ransomware: What You Need to Know

    Ransomware attacks dominate headlines in a seemingly endless parade of compromises in numerous sectors. From Trojan.Gpcoder, the first modern ransomware exploit, to high-profile hits on Colonial Pipeline, it’s becoming clear that security practitioners are up against formidable foes. Read this white paper to learn how to survive ransomware.

    Download

  • How great is your risk of ransomware? An assessment

    Ransomware has become a booming business, complete with its own ecosystem of suppliers, specializations, and affiliate programs. Similarly, detecting and stopping a ransomware attack requires a coordinated effort — one that is risk-informed. In this eBook, learn how to evaluate your organization’s risk in the face of rising ransomware threats.

    Download

  • Computer Weekly – 15 November 2022: How to protect against ransomware attacks

    In this week's Computer Weekly, we look at how to prepare for and protect against ransomware, and what to do if you're hit by an attack. We gauge industry reaction to Ofcom's plan to investigate the big three cloud providers. And we find out how travel giant TUI is implementing self-service analytics. Read the issue now.

    Download

  • Trust no one: Why zero trust security is taking the world by storm

    As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.

    Download

  • Comprehensive Guide to Security Operations

    Despite sizeable budgets and an array of technology solutions at their disposal, most security teams can barely keep up with the bombardment of threats targeting IT environments as the attack surface continues to expand. Access this guide to learn a pragmatic approach to reducing the risk and impact of an attack and improving security resiliency.

    Download

  • The state of ransomware

    Ransomware continues to impact organizations of all sizes, with the average number of monthly attacks growing 75%. Download this white paper to unlock insight into the state of ransomware security.

    Download

  • Endpoint security 101

    Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.

    Download

  • Top ransomware myths and how to best strategize

    When 79% of organizations report that they’ve experienced a ransomware attack in the last year, it has become critical for organizations to have the tools to better protect themselves. However, it can be difficult to know the best way for companies to strategize and build their defenses. Access this report to learn more.

    Download

  • The state of the threat landscape.

    The problem isn't malware — it's adversaries. To stop these adversaries, security teams must understand how they operate. In the 2023 Threat Hunting Report, CrowdStrike's Counter Adversary Operations team exposes the latest adversary tradecraft and provides knowledge and insights to help stop breaches.

    Download

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

    Download

  • MicroScope – September 2022: The green agenda

    Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.

    Download

  • Can Lady Gaga and Madonna get people to take security seriously

    What does it take to get people to pay attention to cyber security? A celebrity law firm hack may hold some answers. Read more in this PDF.

    Download

  • Computer Weekly – 25 July 2023: Getting comfortable with data

    In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.

    Download

  • CW APAC - January 2021: Trend Watch - CIO trends

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly reviews some key IT trends that are likely to shape the industry in 2021.

    Download

  • Computer Weekly - 12 October 2021: How AI - and puffins - are boosting renewable energy

    In this week's Computer Weekly, we find out how an artificial intelligence system for tracking puffins could help boost renewable energy use. We examine the often-overlooked, but often damaging, diversity issue of age discrimination in tech. And we look at the key considerations when choosing enterprise cloud file services. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to anti-ransomware

    The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

    Download

  • Ransomware attacks: Key findings from ESG

    Without an industry reference architecture or blueprint for ransomware protection, organizations are building their own strategies and processes to respond. But many are confused about what is to be included and who is responsible. Download this ESG

    Download

  • Computer Weekly – 12 December 2023: Shaping the modern workplace

    In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • Exposing the Open, Deep, and Dark Web

    Cybercrime is rampant and cybercriminals are raking in billions. As a security leader, you need to take a proactive approach to identifying and mitigating these threats – but regularly taking the pulse on the vast and dynamic underground web can be a daunting proposition. Download the white paper to learn more.

    Download

  • Fighting Ransomware: Understanding Team Roles and Responsibilities

    To help you better secure, defend, and recover your data, maintain healthy business operations, and manage risk, you need an approach that brings together IT, security, and critical stakeholders. Read this e-book to learn how to improve cross-team alignment and collaboration in the fight against ransomware.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Computer Weekly – 9 April 2019: Using data science at Sainsbury's

    In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.

    Download

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

    Download

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

    Download