EZINE:
In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
RESEARCH CONTENT:
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
EZINE:
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
EGUIDE:
In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
RESEARCH CONTENT:
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
EGUIDE:
Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
EGUIDE:
Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
EGUIDE:
The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
EBOOK:
Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.