Threats Reports

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

CW Benelux ezine August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
Posted: 08 Feb 2021 | Published: 09 Aug 2018

TechTarget ComputerWeekly.com

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Advanced cybersecurity fraud and how to fight it
sponsored by TechTarget Security
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security