Web Threats Reports

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Royal Holloway: Cloud-native honeypot deployment
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
Posted: 22 Apr 2022 | Published: 25 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

TechTarget ComputerWeekly.com

CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly – 14 August 2018: Infrastructure under attack
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Aug 2018

TechTarget ComputerWeekly.com

Manchester United praised for swift response to cyber attack
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 08 Feb 2021 | Published: 23 Oct 2019

ServiceNow