ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Advanced Malware Protection: A Buyer's Guide

    Sponsored by: Cisco Systems, Inc.

    This white paper identifies the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and shows you how to combat today's advanced malware attacks using a combination of four techniques.

  • Ransomware: Block Attackers with a Layered Defense

    Sponsored by: Cisco Systems, Inc.

    Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.

  • Eight Best Practices To Prevent Your Data From Being Held Hostage

    Sponsored by: Dell SonicWALL

    Discover these 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Why Ransomware Attacks Are A Growing Threat To Health IT

    Sponsored by: Cisco

    Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.

  • How to Prevent and Respond to a Healthcare Ransomware Infection

    Sponsored by: Cisco

    In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.

  • Busting the Myth of the Malware “Silver Bullet”

    Sponsored by: Intel Security

    This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.

  • Dissecting the Spora Ransomware: What Makes This Malware Tick?

    Sponsored by: Booz Allen Hamilton

    Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.

  • An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web

    Sponsored by: Booz Allen Hamilton

    Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • Details on Newly Observed GhostAdmin Botnet

    Sponsored by: Booz Allen Hamilton

    Gain a rare look at the beginnings of a malware threat and learn how Booz Allen Hamilton discovered and identified indicators of compromise for the newly observed GhostAdmin malware and how to protect your enterprise from falling prey to it.

  • Ransomware: What every healthcare organization needs to know

    Sponsored by: Cisco

    In the healthcare industry, information security is critical. It's also a tremendous challenge, now more than ever before. In this e-book, you'll learn about the impact of ransomware on the myriad of networkable devices being used to improve patient care today.

  • How the Houston Astros Protected their Network from Internet Threats

    Sponsored by: ContentKeeper

    Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.

  • How a global medical manufacturer routs out ransomware

    Sponsored by: Cisco

    Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.

  • Financial Technologies Protects its Network From Malware and Other Internet Threats

    Sponsored by: ContentKeeper

    Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.

  • Getting Out In Front of Cyberthreats In 2017

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.

  • How to Keep Your Organization Safe from Advanced Malware

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.

  • Smart Strategies To Protect Your Email From Phishing and CEO Fraud

    Sponsored by: Mimecast

    Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks.

  • Resetting Your Email Security Strategy

    Sponsored by: Mimecast

    Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.

  • New Email-Borne Malware Campaign Highlights Danger Of Over Reliance On Sandboxes

    Sponsored by: Mimecast

    Today, new tools are able to convert potentially harmful read-only attachments into safe versions without being delayed by sandboxing. Learn more about tools that can ensure all original email attachments are sandboxed by an appropriately advanced email security gateway.

  • Malware Prevention vs. Detect and Respond

    Sponsored by: Dell India

    Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.

  • Insights Into How Math Can Defeat Malware

    Sponsored by: Dell India

    Malware has always evolved faster than security measures could keep up...until now. Access this white paper to learn about a math and machine-learning approach that enables you to identify potential threats based on mathematical risk factors, so that you can make the right decisions in real time.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.