Cybersecurity

Cybersecurity Reports
Infographic: Most valuable cybersecurity certifications
sponsored by ComputerWeekly.com
INFOGRAPHIC: A consensus of industry professionals rank these security certifications as the most coveted by employers and security pros.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

TOPICS:  Cybersecurity
ComputerWeekly.com

Essential Guide: APAC women in cyber security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

ComputerWeekly.com

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Six Signs Your Cybersecurity Training Program Needs an Overhaul
sponsored by CyberVista
EBOOK: According to Verizon’s 2020 DBIR, ransomware accounts for 27% of malware incidents, and 18% of organizations blocked at least one attack. The most effective defense against these threats is an effective cybersecurity training program – but how can you tell if yours is in need of an overhaul? Read this e-book for 6 surefire signs.
Posted: 01 Oct 2021 | Published: 23 Jul 2021

TOPICS:  Cybersecurity
CyberVista

The State of Hybrid Workforce Security 2021
sponsored by Palo Alto Networks
RESOURCE: A new report, developed from a survey of more than 3,000 enterprises conducted by research firm ONR on behalf of Palo Alto Networks, takes a closer look at how real organizations define the balance between productivity and security risks for their remote and hybrid environments.
Posted: 27 Sep 2021 | Published: 24 Sep 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Top 10 cyber crime stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to SIEM and SOAR
sponsored by ComputerWeekly.com
EGUIDE: The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

ComputerWeekly.com

CW Europe - September-November 2021: Dutch researchers build security software to mimic human immune system
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, find out how researchers in the Netherlands are attempting to help IT systems fight certain cyber attacks in a similar way to the human immune system works. Also find out about the so-called "Klarna academy" in Stockholm, which has created the next set of Nordic fintech entrepreneurs.
Posted: 31 Aug 2021 | Published: 09 Sep 2021

ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

ComputerWeekly.com

Managing Cyber Risk As A Business Issue
sponsored by Dell Technologies
EBRIEF: Ransomware and cyberattacks —insider, outsider and even nation-sponsored—threaten your organization’s ability to operate. You could lose millions of dollars in a single attack – so, how will you guard against the threat? Read this brief to learn about managing cyber risk as a business issue.
Posted: 25 Aug 2021 | Published: 25 Aug 2021

TOPICS:  Cybersecurity
Dell Technologies

ESG The Pressing Need for Comprehensive Cyber Risk Management
sponsored by ServiceNow
ANALYST REPORT: There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.
Posted: 17 Aug 2021 | Published: 31 Dec 2019

ServiceNow

5 key questions to optimizing security log management
sponsored by Graylog
WHITE PAPER: While most security experts agree that event log data provides much-needed visibility into the threats facing your environment, many lack the time to collect, manage and correlate log data. Read this white paper to learn more about implementing centralized log management, including 5 key questions to ask to optimize security log management.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

TOPICS:  Cybersecurity
Graylog

HOW MSPs AND BUSINESSES CAN AVOID RANSOMWARE ATTACKS
sponsored by Webroot
RESOURCE: Ransomware has become the bane of most organizations’ existence – but by following the 7 simple tips outlined in this checklist, businesses and MSPs can drastically reduce the chances they’ll fall victim to ransomware. Read on to access the checklist.
Posted: 11 Aug 2021 | Published: 11 Aug 2021

TOPICS:  Cybersecurity
Webroot

5 TIPS TO HELP MSPs MAKE MONEY WITH SECURITY AWARENESS TRAINING
sponsored by Webroot
RESOURCE: According to a recent study, after 12 months of security awareness training, users are 70% less likely to fall for a phishing attempt. Access this checklist to learn 5 ways MSPs like yourself can add security awareness training to your existing portfolio – and do so profitably.
Posted: 11 Aug 2021 | Published: 11 Aug 2021

TOPICS:  Cybersecurity
Webroot

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

How to Shrink Supply Chain Risk
sponsored by TechTarget
RESOURCE: The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.
Posted: 02 Aug 2021 | Published: 29 May 2021

TechTarget

Device Identity and Component Attestation comes to HPE Gen10 Plus Servers
sponsored by HPE and Intel®
WHITE PAPER: Explore this white paper to learn how the use of IDevIDs on HPE Gen10 Plus servers and systems broadens HPE’s existing support for IDevID, leading to benefits like extended Zero Trust capabilities and HPE as-a-service management offerings.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  Cybersecurity
HPE and Intel®

CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career
sponsored by ComputerWeekly.com
EZINE: The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
Posted: 29 Jul 2021 | Published: 12 Aug 2021

ComputerWeekly.com

Ransomware Weather Report - July 2021
sponsored by ComputerWeekly.com
EGUIDE: In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
Posted: 29 Jul 2021 | Published: 29 Jul 2021

ComputerWeekly.com

Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.
Posted: 23 Jul 2021 | Published: 27 Jul 2021

ComputerWeekly.com

CPP Associates Security Practice
sponsored by CPP Associates
VIDEO: Like any sect of criminal, cybercriminals thrive in times of crisis – such as the COVID-19 pandemic that impacted nearly everyone. This short video highlights some of the changes in the threat landscape and overviews the key functions and capabilities of CPP Associates’ security offerings.
Posted: 14 Jul 2021 | Premiered: 28 Sep 2020

TOPICS:  Cybersecurity
CPP Associates

The State Of Brand Protection 2021 A New Front Opens Up In The War For Brand Safety
sponsored by Mimecast
RESEARCH CONTENT: Brand impersonation saw a massive spike in 2020, both in terms of attacks as well as domains suspected to be fraudulent. Read this research report to learn more about the state of brand impersonation in 2021, including how this threat has evolved and what organizations should be doing to protect their brand.
Posted: 13 Jul 2021 | Published: 13 Jul 2021

TOPICS:  Cybersecurity
Mimecast

The Hidden Costs Of Ransomware
sponsored by Webroot
EGUIDE: If existing security processes and tools were working as advertised, ransomware attacks wouldn’t be seeing the success rates they are now – so who is to blame for the rise of ransomware? Read this e-guide for a closer look at the hidden costs of ransomware, the gamble of partial protection, ransomware best practices, and more.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TOPICS:  Cybersecurity
Webroot

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com