ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • How to Keep Your Organization Safe from Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.

  • Smart Strategies To Protect Your Email From Phishing and CEO Fraud

    Sponsored by: Mimecast

    Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks.

  • Resetting Your Email Security Strategy

    Sponsored by: Mimecast

    Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.

  • New Email-Borne Malware Campaign Highlights Danger Of Over Reliance On Sandboxes

    Sponsored by: Mimecast

    Today, new tools are able to convert potentially harmful read-only attachments into safe versions without being delayed by sandboxing. Learn more about tools that can ensure all original email attachments are sandboxed by an appropriately advanced email security gateway.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell, Inc. & Intel®

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Insights Into How Math Can Defeat Malware

    Sponsored by: Dell, Inc. & Intel®

    Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: SingTel

    Learn how to counter the modern threat landscape of phishing, ransomware, and other malware. An enterprise's defense against such malignant activates can mean the difference between success and going out of business.

  • Exploit Kits: Getting In by Any Means Necessary

    Sponsored by: Palo Alto Networks

    This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: KnowBe4

    This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Sponsored by: KnowBe4

    This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • Firewall Sprawl: Four Security Gaps Exposed

    Sponsored by: FireMon

    Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.

  • Redefining Next-generation Endpoint Security Solutions

    Sponsored by: Intel Security

    Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.

  • Block Zero-Day Threats Before They Hit Endpoints

    Sponsored by: Intel Security

    Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.

  • Neutralize Threats with a Collaborative Security Fabric

    Sponsored by: Intel Security

    Discover how to get ahead of today's advanced threats and remediate attacks in a timely manner. Manage security operations faster by integrating all defenses across the threat lifecycle into a single collaborative fabric, enabling your organization to make smarter, more efficient security decisions.

  • Ransomware: A Hostage Rescue Manual

    Sponsored by: KnowBe4

    Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • Incident Response

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: Fortinet, Inc.

    What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.

  • The Rise of Fileless Malware Attacks

    Sponsored by: Fortinet, Inc.

    This expert e-guide looks at how fileless malware works, how it's becoming more sophisticated, and what you can do to protect yourself from such threats.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.