Search Results for: security

MicroScope – February 2023: Opportunities in security
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

MicroScope

BadUSB 2.0: Exploring USB man-in-the-middle attacks
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

TechTarget ComputerWeekly.com

In 2017, the insider threat epidemic begins
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

TechTarget ComputerWeekly.com

Cyber security in the Middle East
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.

TechTarget ComputerWeekly.com

Focus: Securing new technology
The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

TechTarget ComputerWeekly.com

The State of Cloud Native Security
As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.

Palo Alto Networks

Web security: Important but often overlooked
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

TechTarget ComputerWeekly.com

Infographic: SIEM vs. SOAR vs. XDR
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

TechTarget ComputerWeekly.com