Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyber-warfare

RSS Feed   
Cyber-warfare Reports
 
No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by ComputerWeekly.com
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

Web security: Important but often overlooked
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 24 Nov 2017 | Published: 24 Nov 2017

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement