According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents." Unlike a nuisance virus or computer attack that results in a denial of service, a cyberterrorist attack is designed

IAM: Managing identity remains key to cyber security sponsored by ComputerWeekly.com EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly. Posted: 13 Feb 2020 | Published: 13 Feb 2020

TOPICS: Cybersecurity | Cyberterrorism | Identity Management

86 million reasons to support No More Ransom sponsored by ComputerWeekly.com EGUIDE: Anti-ransomware cross-industry initiative says it has prevented more than £86m in ransom payments as it marks its third anniversary, which coincides with a resurgence in ransomware in many parts of the world. Posted: 13 Feb 2020 | Published: 13 Feb 2020

TOPICS: Cybersecurity | Cyberterrorism

IAM: Managing identity remains key to cyber security sponsored by ComputerWeekly.com EGUIDE: IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly. Posted: 29 Aug 2019 | Published: 29 Aug 2019

TOPICS: Cybersecurity | Cyberterrorism | Identity Management

CIO Trends #9: Benelux sponsored by ComputerWeekly.com EGUIDE: In this e-guide we reveal why Dutch authorities temporarily halt datacentre construction, how Luxembourg attracts the growing IT companies. Also, read on for details of blockchain confusion in the Netherlands as well as how a local academic is unmasking cybercriminals. Posted: 30 Jul 2019 | Published: 30 Jul 2019

TOPICS: Cybersecurity | Cyberterrorism | Data Center Construction | IT Governance