Cybercrime Reports

Focus: Infosec17
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018

TechTarget ComputerWeekly.com

CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
sponsored by TechTarget ComputerWeekly.com
EZINE: There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
Posted: 08 Feb 2021 | Published: 08 Aug 2019

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Cyber attackers exploiting poor cloud security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 08 Feb 2021 | Published: 23 Aug 2019

TechTarget ComputerWeekly.com

The Next Generation of Cybercrime: How it's evolved, where it's going
sponsored by DellEMC and Intel®
WHITE PAPER: Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Posted: 19 May 2011 | Published: 19 May 2011

DellEMC and Intel®

The Reality of Cyber Warfare
sponsored by AT&T Corp
WHITE PAPER: Examine the topic of trench warfare in a cyber-world and discover many factors you need to know about these potentially disastrous events.
Posted: 28 Mar 2012 | Published: 13 Dec 2011

AT&T Corp

Cyber attackers exploiting poor cloud security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Multi-pronged approach to cyber security professional development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com

April Information Security - Defending Against the Digital Invasion
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we cover top cyberthreats and countermeasures to help organizations defend against new and evolving attack techniques.
Posted: 01 Apr 2015 | Published: 25 Mar 2015

TechTarget Security