EGUIDE:
In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
RESEARCH CONTENT:
In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
EZINE:
Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
EGUIDE:
In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
EGUIDE:
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
EGUIDE:
Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
EZINE:
Hackers are embracing all advantages of the cloud, launching lucrative attacks like malicious cryptomining, DDoS, and ransomware. In this issue of Information Security magazine, editor Kathleen Richards looks at cloud security in 2018 and reveals strategies to protect sensitive data from new internal and external threats.
EBOOK:
What does a CISO do now, with risks proliferating and the most-needed security skills in short supply? Learn why the CISO role is more vital than ever.
EGUIDE:
In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.
EGUIDE:
New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.