skip to Main Content

This page was archived on 18th March, 2019 and is no longer actively maintained.

Cybercrime - Further Information

This page shows up to 100 pieces of content (newest at the top):

Cover for Security is a human problem

Security is a human problem

Phishing has emerged as a key factor in most security breaches. Where email used to be the primary means of delivering such attacks, technology advances and raised awareness are making such attacks less effective.
Cover for Evolving uses of the kill chain framework

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware

The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain
Cover for Managing Cyber Business Risk

Managing Cyber Business Risk - with Content Assurance and Cyber Insurance

Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
post (Icon)

ISO Cybersecurity Standard

Past ISO security standards have a good reputation, so the auspices are good for its new CyberSecurity standard. However, treat it as a framework, not a bible
post (Icon)

The Technology Behind Cyberterrorism - Modern technologies, propaganda and improving the resilience of cyber control systems

Understanding the use of modern technologies to spread propaganda in support of cyberterror and improving the resilience of cyber control systems
post (Icon)

Cyber Threats to National Security - Notes from a Webinar Lecture

Lecture notes from a recent webinar held in conjunction with IHS Janes.
post (Icon)

Nigel Stanley Presents at Jane’s Cyberwar Webinar

Transcript of a recent cyberwarfare webinar presentation with IHS Janes
post (Icon)

Making compliance real for those in the trenches - A Webinar with LogLogic

IT security people are now required to understand and help implement compliance solutions
post (Icon)

Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 3 - Attacks on computer systems

There are a variety of ways in which websites and public-facing computer systems can be attacked by hacktivists and cyberterrorists
post (Icon)

Cybercrime, Cyberwars, Cyberterrorism and Hacktivism – Part 2 - The internet

The second part of a multi-part series on Cybercrime, Cyberwars, Cyberterrorism and Hacktivism
Cover for Cybercrime, Cyberwars, Cyberterrorism and Hacktivism

Cybercrime, Cyberwars, Cyberterrorism and Hacktivism

What exactly is the truth behind cybercrime, cyberwarfare, cyberterrorism and hacktivism? What do you need to know, and do, to deal with the problem?
post (Icon)
Cover for The Security Paradox

The Security Paradox - An EMEA Study

This paper will explain why the security paradox needs to be addressed sooner rather than later.
Back To Top