Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Electronic Terrorism

RSS Feed   
Electronic Terrorism Reports
 
Application security: More important than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

TOPICS: 
ComputerWeekly.com

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by SearchSecurity.com
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

TOPICS: 
SearchSecurity.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

TOPICS: 
ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS: 
ComputerWeekly.com

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by ComputerWeekly.com
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

TOPICS: 
ComputerWeekly.com

Cyber-physical attacks: Dawn of a new age in cyber-warfare?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the application of cyber power in international relations
Posted: 14 Mar 2017 | Published: 14 Mar 2017

TOPICS: 
ComputerWeekly.com

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

TOPICS: 
ComputerWeekly.com

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

TOPICS: 
Trend Micro, Inc.

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

TOPICS: 
Kaspersky Lab

The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

TOPICS: 
AT&T Corp
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement