Terrorist Attacks Reports

CW Nordics August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 08 Feb 2021 | Published: 23 Aug 2018

TechTarget ComputerWeekly.com

Why Should Companies Take a Closer Look at Business Continuity Planning?
sponsored by Datalink
WHITE PAPER: Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise.
Posted: 27 May 2010 | Published: 26 May 2010

Datalink

86 million reasons to support No More Ransom
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.
Posted: 08 Feb 2021 | Published: 29 Jul 2019

TechTarget ComputerWeekly.com

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

Focus: Enterprise Mobility Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

System z, x86, UNIX: Which is more secure?
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Cyber attackers exploiting poor cloud security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com