Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyber-warfare

RSS Feed   
Cyber-warfare Reports
 
Cyber attackers exploiting poor cloud security
sponsored by ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 23 Aug 2019 | Published: 23 Aug 2019

ComputerWeekly.com

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

CIO Trends #9: Benelux
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 24 May 2019 | Published: 24 May 2019

ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Focus: Enterprise Mobility Management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Australia's cybersecurity game plan
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 23 Aug 2020 | Published: 24 Aug 2020

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info