Focus: Enterprise Mobility Management
sponsored by ComputerWeekly.com
EGUIDE:
In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
Posted: 21 Jun 2018 | Published: 21 Jun 2018
|
|
|
Essential guide to dealing with a data breach
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
Posted: 03 Jan 2018 | Published: 03 Jan 2018
|
|
|
Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017
|
|
|
Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE:
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012
|
|
|
World Economic Forum Global Risks Report 2018
sponsored by ComputerWeekly.com
RESEARCH CONTENT:
The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 16 Jan 2018 | Published: 17 Jan 2018
|
|
|
IT/OT convergence is necessary, but not so simple
sponsored by ComputerWeekly.com
EGUIDE:
This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 13 Aug 2020 | Published: 14 Aug 2020
|
|
|
Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017
|
|
|
Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE:
In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017
|
|
|
Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER:
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010
|
|
|
The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER:
Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011
|
|
|
|
|