Network Threats Reports

Infographic: 5 ways to achieve a risk-based security strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
Posted: 08 Feb 2021 | Published: 16 Aug 2019

TechTarget ComputerWeekly.com

13 steps for enabling secure remote work
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

CW Europe - June-August 2020: 5G rush in Russia
sponsored by TechTarget ComputerWeekly.com
EZINE: Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
Posted: 08 Feb 2021 | Published: 11 Jun 2020

TechTarget ComputerWeekly.com

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Top APAC security predictions for 2020
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 08 Feb 2021 | Published: 12 Dec 2019

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.