Cyberwarfare Reports

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Essential guide to dealing with a data breach
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
Posted: 08 Feb 2021 | Published: 03 Jan 2018

TechTarget ComputerWeekly.com

Security analytics: Enabling organisations to get ahead of attackers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.
Posted: 08 Feb 2021 | Published: 19 Aug 2019

TechTarget ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019

TechTarget ComputerWeekly.com

Cyber security in the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Security Analytics:A popular addition to cyber defence arsenals
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

CW Europe - June-August 2022: Russia escalates cyber war on Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE: Microsoft has given details of cyber attacks on Ukrainian civilian communications, nuclear safety authorities, and the exploitation of the destruction of Mariupol in a phishing campaign.
Posted: 27 May 2022 | Published: 09 Jun 2022

TechTarget ComputerWeekly.com

Even fintech startups battling to meet cyber security skills
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
Posted: 08 Feb 2021 | Published: 21 Aug 2019

TechTarget ComputerWeekly.com

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.