Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyberwarfare

RSS Feed   
Cyberwarfare Reports
 
Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-FiĀ  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Terrorist use of the internet
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

McAfee Initiative to Fight Cybercrime
sponsored by Intel Security
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

Malware Security Report: Protecting Your Business, Customers and Bottom Line
sponsored by VeriSign Australia
WHITE PAPER: This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement