Application Security Threats Reports

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TechTarget ComputerWeekly.com

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by TechTarget ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 08 Feb 2021 | Published: 12 Dec 2019

TechTarget ComputerWeekly.com

CIO Trends #10: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Top 10 cyber security stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

How long does it take to get owned?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Ransomware: The situation at the beginning of 2022 Infographic
sponsored by TechTarget ComputerWeekly.com
EBOOK: The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

ServiceNow