Remote Access Policies Reports

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

Comparing Azure Active Directory options
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of the cloud. Microsoft offers four editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
Posted: 01 Aug 2022 | Published: 01 Aug 2022

TechTarget ComputerWeekly.com

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

CW Europe: December 2016 - February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 08 Feb 2021 | Published: 15 Dec 2016

TechTarget ComputerWeekly.com

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com