Security News White Papers

CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal

Security News White Papers - Thu, 08/15/2019 - 12:00am
There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers. Published by:

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

Security News White Papers - Tue, 07/30/2019 - 12:00am
In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now. Published by:

CW ASEAN: Trend Watch – Security

Security News White Papers - Thu, 07/25/2019 - 12:00am
Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools. Published by:

CW ANZ: Trend Watch – Security

Security News White Papers - Thu, 07/25/2019 - 12:00am
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite. Published by:

Introduction to Container and Orchestration

Security News White Papers - Sat, 07/20/2019 - 12:00am
For some time it was only the largest organizations that needed software to organize and automate all of the services that made up modern applications. This year, however, your organization might want to look into an orchestration tool. Click here to learn about your options. Published by: TechTarget

Complete Guide to Ransomware Attack Prevention

Security News White Papers - Sat, 07/20/2019 - 12:00am
If you think ransomware couldn't get any sneakier, think again: it's now capable of infiltrating an organization's backups, meaning contaminated files used to restore data will only perpetuate the attack cycle. Published by: TechTarget

Practical Steps to Take When Implementing Zero Trust

Security News White Papers - Sat, 07/20/2019 - 12:00am
The traditional network perimeter is disappearing, that's why many turn to zero trust. Participate in our multiple-choice survey for a free PDF of our guide Implementing a Zero-Trust Approach to Network Security. Published by: TechTarget

Assessing Endpoint Security Tools in the Market

Security News White Papers - Sat, 07/20/2019 - 12:00am
Phishing scams and cyberattacks are on the rise. Hackers break in through a company network and gain access to all connected endpoints. As the volume of these threats increase, so does the need for endpoint security tools. Participate in our research program to gain access to our guide on endpoint security tools. Published by: TechTarget

Infographic: 2019 IT Priorities - Middle East

Security News White Papers - Tue, 07/16/2019 - 12:00am
In this infographic, we shine a light on our 2019 IT Priorities survey results. Discover what IT departments are investing in and how much budgets are increasing by. Taken from a study of 151 respondents from across Middle East. Published by:

The UK manufacturing sector needs a digital upgrade

Security News White Papers - Tue, 07/09/2019 - 12:00am
In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now. Published by:

Cybersecurity strategies: Best-of-breed or integrated security suites?

Security News White Papers - Thu, 07/04/2019 - 12:00am
The cybersecurity market challenges channel partners to evaluate best-of-breed point products vs. integrated IT security bundles. Published by:

Proving ownership of IPv6 addresses

Security News White Papers - Tue, 07/02/2019 - 12:00am
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete. Published by:

APAC guide to plugging endpoint security gaps

Security News White Papers - Mon, 07/01/2019 - 12:00am
In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices. Published by:

Why EDR technologies are essential for endpoint protection

Security News White Papers - Thu, 06/27/2019 - 12:00am
EDR technologies are what security pros need to protect endpoints from zero-day malware and other advanced persistent threats. Learn how endpoint detection and response products work to keep attackers from vulnerable laptops, tablets and other endpoints that traverse the enterprise network. Published by: