Information Wars Reports

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 08 Feb 2021 | Published: 21 Mar 2019

TechTarget ComputerWeekly.com

CIO Trends #7: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at some of the challenges and opportunities facing CIOs. There are few more difficult challenges than those brought about by cybersecurity threats - find out why SMEs in the Netherlands are struggling with this. Also find out how united action in the Netherlands could help solve the huge problem of Ddos attacks.
Posted: 08 Feb 2021 | Published: 23 Jul 2018

TechTarget ComputerWeekly.com

CW APAC – July 2021: Trend Watch: Supply Chain Security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain
Posted: 09 Jul 2021 | Published: 09 Jul 2021

TechTarget ComputerWeekly.com

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly - 15 March 2022: How the tech sector is supporting Ukraine
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
Posted: 14 Mar 2022 | Published: 15 Mar 2022

TechTarget ComputerWeekly.com

World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018

TechTarget ComputerWeekly.com

CW Europe – January 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: As we start another new year, we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

TechTarget ComputerWeekly.com

Businesses Eye VDI Security to Fight Cyberattacks
sponsored by Citrix
EGUIDE: The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints. Download our e-guide to learn how VDI security can bulk up your defenses against cyberattacks.
Posted: 20 Dec 2016 | Published: 15 Dec 2016

Citrix

The Next Generation of Cybercrime: How it's evolved, where it's going
sponsored by DellEMC and Intel®
WHITE PAPER: Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Posted: 19 May 2011 | Published: 19 May 2011

DellEMC and Intel®

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.