Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Electronic Terrorism

RSS Feed   
Electronic Terrorism Reports
 
CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com

IAM: Managing identity remains key to cyber security
sponsored by ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

ComputerWeekly.com

CIO Trends #9: Benelux
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

CW Europe – January 2015
sponsored by ComputerWeekly.com
EZINE: As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

E-Guide: Clearing Up the Confusion to Prepare for APTs
sponsored by Dell SecureWorks
EGUIDE: Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Dell SecureWorks

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info