Day Zero Threats Reports

BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

Royal Holloway: Corporate under-reporting of cyber crime
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
Posted: 26 May 2022 | Published: 26 May 2022

TechTarget ComputerWeekly.com

CW APAC, July 2020: Trend Watch: Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 17 May 2021 | Published: 17 May 2021

TechTarget ComputerWeekly.com

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 08 Feb 2021 | Published: 12 Dec 2019

TechTarget ComputerWeekly.com

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Shields up! Why Russia's war on Ukraine should matter to security pros
sponsored by TechTarget ComputerWeekly.com
EBOOK: The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
Posted: 11 Mar 2022 | Published: 11 Mar 2022

TechTarget ComputerWeekly.com

Advanced cybersecurity fraud and how to fight it
sponsored by TechTarget Security
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security

SOAR vs. SIEM: Commonalities and Differences
sponsored by ServiceNow
EGUIDE: While some IT shops could get away with using a SIEM or a SOAR tool, they are best deployed as complementary products. Although these tools have major commonalities, they also have distinct differences. In this e-guide, learn all about the key similarities and differences in SIEM and SOAR.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

ServiceNow