Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyberwarfare

RSS Feed   
Cyberwarfare Reports
 
CW Buyers Guide To Finance and Insurance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

CIO Trends #9: Benelux
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Cyber attackers exploiting poor cloud security
sponsored by ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Security analytics: Enabling organisations to get ahead of attackers
sponsored by ComputerWeekly.com
EGUIDE: In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

ComputerWeekly.com

Debunking APT myths: What it really means and what you can do about it
sponsored by SearchSecurity.com
EGUIDE: This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

SearchSecurity.com

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info