716 Results for:SPAM

  • Sort by: 

What to expect from Dynatrace Perform 2023

By Adrian Bridgwater 12 Jan 2023

It’s been three years. It’s been three long years (and we all know why) since the Computer Weekly Developer Network team was able to ask: what can we expect from the Dynatrace Perform conference ... Read More

Security Think Tank: In 2023, we need a new way to cultivate better habits

By Mandy Andress 03 Feb 2023

Regular, small adjustments to behaviour offer a better way to keep employees on track and cultivate a corporate culture of cyber awareness, writes Elastic’s Mandy Andress Read More

Kaspersky threat data added to Microsoft Sentinel service

By Alex Scroxton 22 Aug 2022

Microsoft and Kaspersky have agreed a collaboration to integrate Kaspersky’s threat data feeds into Microsoft’s cloud-native SIEM/SOAR service Read More

Google algorithms explained: Everything you need to know

By Ben Lutkevich 20 Apr 2023

There are petabytes of information on Google, and its algorithm is the engine that organizes it all. Read More

How to create a ransomware incident response plan

By Paul Kirvan, Sharon Shea 14 Aug 2023

A ransomware incident response plan may be the difference between surviving an attack and shuttering operations. Read key planning steps, and download a free template to get started. Read More

Top 10 SMS marketing best practices

By David Weldon 11 May 2023

Customers may be willing to opt into receiving texts from a brand, but marketers should follow various best practices to ensure they don't overload or overstep with customers. Read More

Chinese HUI Loader malware ups the ante on espionage attacks

By Shaun Nichols 23 Jun 2022

A state-sponsored piece of malware may become a favorite weapon for Beijing-backed hacking crews looking to lift intellectual property from foreign firms. Read More

Why is Emotet back, and should we be worried about it?

By Alex Scroxton 19 Nov 2021

The sudden reappearance of Emotet this week has security teams on high alert, but do we need to be worried about its return, and what should we be doing about it? Read More

Twitter whistleblower report holds security lessons

By Shaun Nichols 25 Aug 2022

The whistleblower report from Twitter's former security lead should provide companies and boards with lessons on how not to handle internal security concerns. Read More

Supervised vs. unsupervised learning: Experts define the gap

By George Lawton 05 Sep 2023

Learn the characteristics of supervised learning, unsupervised learning and semisupervised learning and how they're applied in machine learning projects. Read More