Cybercrime Reports

CIO Trends #9: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Infographic: Ransomware Weather Report 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic: We take a look at the worldwide Ransomware landscape in 2020 and 2021. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

TechTarget ComputerWeekly.com

86 million reasons to support No More Ransom
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world.
Posted: 08 Feb 2021 | Published: 29 Jul 2019

TechTarget ComputerWeekly.com

Essential guide to dealing with a data breach
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
Posted: 08 Feb 2021 | Published: 03 Jan 2018

TechTarget ComputerWeekly.com

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

Top 10 cyber crime stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once again, in 2019 the cyber threat landscape proved the old biblical adage correct – there is nothing new under the sun. Data breaches were 10 a penny – indeed, in some cases they can actually be bought for pennies. Here are Computer Weekly's top 10 cyber crime stories of 2019.
Posted: 10 Sep 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

CW EMEA - April 2023: Under attack and stressed out
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.
Posted: 12 Apr 2023 | Published: 13 Apr 2023

TechTarget ComputerWeekly.com

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Cyber attackers exploiting poor cloud security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com