EGUIDE:
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
EGUIDE:
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
EGUIDE:
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.
EGUIDE:
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
EGUIDE:
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
EZINE:
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
EGUIDE:
Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.