Zero Day Threats Reports

5 cybersecurity myths and how to address them
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

TechTarget ComputerWeekly.com

BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

CW Nordics ezine February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 08 Feb 2021 | Published: 22 Feb 2018

TechTarget ComputerWeekly.com