| | You Might Also Be Interested In: | Mitigating the cyber threat from malicious insiders Sponsored by ComputerWeekly.com This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat. | Limiting malware propagation – a way forward Sponsored by ComputerWeekly.com This article in our Royal Holloway Information Security Thesis Series puts forward a suggestion for the creation and implementation of a hypervisor at a layer below the operating system. | Financial markets regulatory outlook 2017 Sponsored by ComputerWeekly.com Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report. | The insider threat – solved with DRM Sponsored by ComputerWeekly.com Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information. | Towards more robust internetworks Sponsored by ComputerWeekly.com This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks. | | This newsletter is published by Bitpipe.com, part of the TechTarget network. TechTarget, Member Services, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners. When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy. Privacy Policy | Unsubscribe | |
No comments:
Post a Comment