Day Zero Threats Reports

CW ASEAN: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

How Russia's war in Ukraine is changing the cybersecurity game and why that matters
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

Security Think Tank: Biden's Cyber Security Plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 08 Feb 2021 | Published: 05 Feb 2021

MicroScope

7 risk mitigation strategies to protect business operations
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.
Posted: 13 Oct 2022 | Published: 13 Oct 2022

TechTarget ComputerWeekly.com

13 steps for enabling secure remote work
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com