Cybersecurity

Cybersecurity Reports
Top 10 cyber security stories of 2021
sponsored by ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

ComputerWeekly.com

Infographic: Top IT predictions in APAC in 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.
Posted: 19 Jan 2022 | Published: 19 Jan 2022

ComputerWeekly.com

Computer Weekly - 18 January 2022: The race to quantum computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

MITRE ATT&CK, a guide for businesses in 2022
sponsored by ComputerWeekly.com
EBOOK: Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
Posted: 11 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 04 Jan 2022 | Published: 30 Nov 2020

Bitdefender

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

ComputerWeekly.com

Everything You Need to Know About the Log4j Vulnerability
sponsored by TechTarget
EGUIDE: Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.
Posted: 17 Dec 2021 | Published: 17 Dec 2021

TechTarget

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

ComputerWeekly.com

A Computer Weekly buyer's guide to post-Covid-19 supply chain management
sponsored by ComputerWeekly.com
EGUIDE: The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
Posted: 03 Dec 2021 | Published: 03 Dec 2021

ComputerWeekly.com

The SIEM Buyer's Guide for 2021
sponsored by Splunk
EGUIDE: SIEM has become a core component of modern cybersecurity programs – enabling organizations to detect and act on threats before they strike. The following SIEM buyer’s guide provides a deep dive into the evolution of SIEM, its essential features, key capabilities and what the 2021 SIEM landscape looks like – read on to get started.
Posted: 22 Nov 2021 | Published: 04 Dec 2020

Splunk

Computer Weekly - 23 November 2021: Can the tech community show how to save the world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.
Posted: 22 Nov 2021 | Published: 23 Nov 2021

ComputerWeekly.com

How To Keep Apis Secure From Bot Cyberattacks
sponsored by Radware
WHITE PAPER: APIs remain one of the most lucrative and accessible targets for today’s sophisticated bot attacks. In this white paper, you’ll learn how to prepare your APIs to defend against bot attacks by looking at common vulnerability areas, attack symptoms, and more – read on to get started.
Posted: 18 Nov 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity
Radware

Protecting Your Number 1 Threat Vector
sponsored by Proofpoint
VIDEO: Almost every modern cyberthreat involved humans – either as the target, the catalyst or the adversary. This webinar explores how the cyberattack landscape has changed to be more human-focused and offers 6 best practice for how your organization can shift security practices to be more people-centric. Watch now to get started.
Posted: 18 Nov 2021 | Premiered: 16 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

Driving Real Behaviour Change to Email
sponsored by Proofpoint
VIDEO: People are increasingly becoming the most common target for today’s cyberattacks – but identifying and proactively protecting those at the greatest risk can be nearly impossible. Watch this webinar to learn how to build a security awareness program that is both people-centric and future-proof.
Posted: 18 Nov 2021 | Premiered: 15 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

Unmasking BEC And EAC
sponsored by Proofpoint
WHITE PAPER: The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.
Posted: 18 Nov 2021 | Published: 12 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

The Hidden Costs Of Free
sponsored by Proofpoint
WHITE PAPER: As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.
Posted: 18 Nov 2021 | Published: 10 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

Stopping BEC And EAC
sponsored by Proofpoint
EBOOK: Gartner predicts that business email compromise (BEC) attacks will double each year, totaling $5 billion in actual losses by 2023. So, how should CISOs protect their organizations against this growing threat? Download this exclusive e-book for insight into BEC and email account compromise (EAC) trends, challenges and best practices.
Posted: 18 Nov 2021 | Published: 08 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 18 Nov 2021 | Published: 30 Jun 2020

Proofpoint

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 18 Nov 2021 | Published: 05 Jun 2020

Proofpoint

MSPs: REQUIREMENTS FOR PROVIDING YOUR CLIENTS WITH LEADING RANSOMWARE PROTECTION
sponsored by Malwarebytes
WHITE PAPER: Ransomware is a major threat to any MSP’s clients—including yours—as 68.5% of organizations worldwide are impacted by it, according to Statistica. Access this short white paper to learn what sort of endpoint protection MSPs should look for and see how Malwarebytes meets your ransomware needs.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Malwarebytes

Infographic: 4 types of ransomware
sponsored by ComputerWeekly.com
INFOGRAPHIC: Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
Posted: 16 Nov 2021 | Published: 16 Nov 2021

ComputerWeekly.com

Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
Posted: 12 Nov 2021 | Published: 16 Nov 2021

ComputerWeekly.com

Ransomware Weather Report - July 2021
sponsored by ComputerWeekly.com
EGUIDE: In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

ComputerWeekly.com

Computer Weekly - 9 November 2021: How a cloud-first strategy helped save animals in the pandemic
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the RSPCA about how its cloud-first strategy helped to save animals throughout the pandemic. Data warehouses have been part of the IT landscape for 30 years – but are they now old technology, and what's next? And we assess how Brexit has affected risk and resilience in the datacentre. Read the issue now.
Posted: 08 Nov 2021 | Published: 09 Nov 2021

ComputerWeekly.com