Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Organized Cybercrime

RSS Feed   
Organized Cybercrime Reports
 
Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

CIO Trends #6: Nordics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to counter possible threats posed by a military-resurgent Russia. Read how pooling technologies and competencies was a focal point during summit meetings between Nordic and Baltic government leaders and defence leaders.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

ComputerWeekly.com

Protecting Data From Cybercrime
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: Checkout this white paper to learn how to formulate the optimal backup strategy against prominent cyber threats and discover why a tape air gap cannot be compromised, leading to the highest levels available of hardware data protection.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Fujifilm Recording Media USA, Inc.

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Futureproofing IoT
sponsored by BlackBerry
ANALYST REPORT: The number of devices connected to the internet of things (IoT) is set to more than double in the next five years. While a surge in data promises gains in efficiency and productivity, experts warn of the growing threat from state-sponsored hackers. In this report, explore the steps businesses must take to ensure their IoT is properly secured.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

BlackBerry

Focus: Enterprise Mobility Management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Guide to business continuity planning: COVID-19 and beyond
sponsored by ComputerWeekly.com
EGUIDE: As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.
Posted: 24 Mar 2020 | Published: 25 Mar 2020

ComputerWeekly.com

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info