Day Zero Threats Reports

How Russia's war in Ukraine is changing the cybersecurity game and why that matters
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?
sponsored by XtelligentMedia Healthcare
EGUIDE: Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.
Posted: 08 Apr 2024 | Published: 08 Apr 2024

XtelligentMedia Healthcare

10 types of security incidents and how to handle them
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyberattacks are more varied than ever. Learn the key symptoms that signal a problem and how to respond to keep systems and data safe.
Posted: 05 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by TechTarget ComputerWeekly.com
EZINE: According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 08 Feb 2021 | Published: 11 Feb 2021

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Ransomware: The situation at the beginning of 2022 Infographic
sponsored by TechTarget ComputerWeekly.com
EBOOK: The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

TechTarget ComputerWeekly.com

How to Become a Threat Hunter
sponsored by Cisco Systems Inc.
EGUIDE: Much of hunting is instinct, and when it comes to hunting cyberthreats, it’s no different. Threat hunters are good at what do because they aren’t as ‘by-the-book’ as other professionals. But they do have a set of learnable skills that make them successful. Download this e-guide featuring Gartner analyst John Collins to know what these skills are.
Posted: 14 Apr 2021 | Published: 07 Apr 2021

Cisco Systems Inc.

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019

ServiceNow