EZINE:
In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
INFOGRAPHIC:
2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.
EZINE:
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
EGUIDE:
2019 was a busy year in the world of cyber security, with big stories around network security, data privacy and protection, and the state of General Data Protection Regulation compliance all hitting the headlines – and that's before we even get started on the issue of cyber crime. Here are Computer Weekly's top 10 cyber security stories of 2019.
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
EGUIDE:
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
EGUIDE:
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
EGUIDE:
Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
EBOOK:
The past 12 months saw ransomware attacks hit new levels of sophistication, with cyber criminal gangs turning to increasingly professional-style tactics and targeting more impactful victims – and these trends are highly unlikely to fade as we move further into 2022.