6 principles for building engaged security governance
sponsored by AT&T
EGUIDE:
Information security governance is a system that helps organize and direct dedicated security resources. It influences how goals are set and achieved, how cyber-risks are monitored and assessed, and how security performance is evaluated. Security governance also encompasses the history, structure, internal politics and culture of an organization.
Posted: 28 Mar 2023 | Published: 28 Mar 2023
|
|
|
Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE:
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023
|
|
|
MITRE ATT&CK: Climb to the top
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022
|
|
|
Royal Holloway: Cloud-native honeypot deployment
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
Posted: 22 Apr 2022 | Published: 25 Apr 2022
|
|
|
MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE:
In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022
|
|
|
Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022
|
|
|
Security Think Tank Christmas Special - The most important lessons of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this special edition of Computer Weekly Security Think Tank, we asked our panel of cyber security experts to share their thoughts on the most impactful cyber lessons they've learned during 2021. Download this E-Guide and find out more about their valuable inputs and guidance.
Posted: 11 Jan 2022 | Published: 10 Jan 2022
|
|
|
How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER:
Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021
|
|
|
CW APAC, October 2021: Tech Career Guide
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021
|
|
|
MicroScope – October 2021: Choosing a channel career
sponsored by MicroScope
EZINE:
In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
Posted: 01 Oct 2021 | Published: 01 Oct 2021
|
|
|
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021
|
|
|
Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021
|
|
|
Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021
|
|
|
Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER:
Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020
|
|
|
CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.
Posted: 31 Mar 2021 | Published: 15 Apr 2021
|
|
|
7 Experts on Transitioning to MDR
sponsored by GoSecure
EBOOK:
Managed detection and response (MDR) can help you quickly identify and mitigate cyberattacks. But it’s not always clear when a company should move to MDR, nor is it clear how to get the greatest value from an MDR service. In this e-book, hear from 7 security experts as they offer advice to organizations considering MDR.
Posted: 15 Mar 2021 | Published: 02 Mar 2021
|
|
|
Security And Compliance Automation For Financial Services
sponsored by Red Hat
WHITE PAPER:
A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 15 Mar 2021 | Published: 14 Jan 2021
|
|
|
Spear Phishing: Top Threats and Trends Vol. 5
sponsored by Barracuda
RESEARCH CONTENT:
As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 08 Feb 2021 | Published: 29 Dec 2020
|
|
|
Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021
|
|
|
Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021
|
|
|
Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021
|
|
|
SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021
|
|
|
Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.
Posted: 25 Mar 2021 | Published: 25 Mar 2021
|
|