INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
RESEARCH CONTENT:
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
EGUIDE:
Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
EGUIDE:
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
EGUIDE:
This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
EGUIDE:
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
EGUIDE:
As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.