ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Unmask Evasive Threats: Zero-Day Threat Detection and App Containment

    Sponsored by: McAfee, Inc.

    This white paper explores how to bolster your defense to catch up to and overcome advanced malware threats. Fortify endpoints and learn how to halt zero-day malware in its tracks by discovering which threat detection and containment tools can unmask the most sophisticated hidden threats.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • How to Prevent Ransomware with Network Security

    Sponsored by: TechTarget

    Ransomware appears to be coming of age. In our brand new guide, 5 Ways to Prevent Ransomware with Network Security, Information Security magazine editor Kathleen Richards reveals eye-opening statistics on the state of ransomware while expert Kevin Beaver explains how stronger network security could be the key to preventing ransomware infections.

  • Data Protection Steps for Ransomware

    Sponsored by: TechTarget

    Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.

  • What is Enterprise Mobile Security?

    Sponsored by: Lookout

    Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.

  • An Advanced Analytics Program for SIEM Defense

    Sponsored by: McAfee, Inc.

    As malware becomes more advanced, new identification and analytics programs are needed to help reign in growing threats. Uncover how to find emerging threats in network traffic and effectively block future attacks.

  • A Network Manager's Guide to Ransomware

    Sponsored by: Cisco Umbrella and Dimension Data

    Learn the most common methods of operation for ransomware and what your organization can do to reduce your vulnerability to it. Also discover handy flowcharts detailing the timelines of web-based and email-based ransomware infections, the components of a strong prevention strategy, and more.

  • Eight Ways to Protect Your Network Against Ransomware

    Sponsored by: SonicWall

    This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Your Guide to Spotting and Preventing Malware Infection

    Sponsored by: Solarwinds MSP

    Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • 8 Best Practices To Prevent Your Data From Being Held Hostage

    Sponsored by: Dell SonicWALL

    Discover 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.

  • Why Ransomware Attacks Are A Growing Threat To Health IT

    Sponsored by: Cisco Umbrella

    Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.

  • How to Prevent and Respond to a Healthcare Ransomware Infection

    Sponsored by: Cisco Umbrella

    In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.

  • Busting the Myth of the Malware “Silver Bullet”

    Sponsored by: McAfee, Inc.

    This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.

  • Building Trust in a Cloudy Sky

    Sponsored by: McAfee, Inc.

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • Ransomware: What every healthcare organization needs to know

    Sponsored by: Cisco Umbrella

    In the healthcare industry, information security is critical. It's also a tremendous challenge, now more than ever before. In this e-book, you'll learn about the impact of ransomware on the myriad of networkable devices being used to improve patient care today.

  • How a global medical manufacturer routs out ransomware

    Sponsored by: Cisco Umbrella

    Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.

  • Getting Ahead of Cyber Threats in 2017

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell India

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Insights Into How Math Can Defeat Malware

    Sponsored by: Dell India

    Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.

  • Exploit Kits: Getting In by Any Means Necessary

    Sponsored by: Palo Alto Networks

    This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.

  • Stop Ransomware Before it Starts

    Sponsored by: Carbon Black

    There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.