Internet Threats Reports

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Aug 2018

TechTarget ComputerWeekly.com

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

CW Nordics ezine February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 08 Feb 2021 | Published: 22 Feb 2018

TechTarget ComputerWeekly.com

Shields up! Why Russia's war on Ukraine should matter to security pros
sponsored by TechTarget ComputerWeekly.com
EBOOK: The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.
Posted: 11 Mar 2022 | Published: 11 Mar 2022

TechTarget ComputerWeekly.com

BlackCat emerges as one of the top ransomware threats
sponsored by TechTarget ComputerWeekly.com
EBOOK: After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 08 Feb 2021 | Published: 24 Oct 2019

ServiceNow

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.