ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Eight Ways to Protect Your Network Against Ransomware

    Sponsored by: SonicWall

    This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals.

  • 2017 Annual Threat Report

    Sponsored by: SonicWall

    This 2017 Annual Threat Report looks at both sides of the cybersecurity arms race: the attackers and the targeted organizations. Discover which areas of security are projected to see the most attention and learn how to overcome challenges like SSL encrypted traffic, higher instances of ransomware attacks, IoT security issues, and more.

  • The State of the Cybersecurity Arms Race

    Sponsored by: SonicWall

    In the war against cybercrime, no one gets to avoid battle. In this resource, industry expert Bill Conner provides insight into staying up-to-date on the latest threats and cybersecurity innovations shaping today's landscape.

  • Announcing New and Enhanced SonicWall Email Security 9.0 with Capture ATP to Detect Zero-Day

    Sponsored by: SonicWall

    In 2016, ransomware attacks grew by 167x year-over-year to 638 million. As today's malware and ransomware pose ever evolving malicious, zero-day threats, organizations need to defend their networks beyond their perimeters. Discover how SonicWall can help you block ransomware, inspect email, and more.

  • Next-Gen Email Security and Advanced Threat Protection

    Sponsored by: SonicWall

    SonicWall, a trusted security partner protecting more than a million business networks worldwide, announced a new email security platform and firewall for breach prevention against ransomware and other advanced threats. Discover how their platform integrates with advanced threat protection to deliver sound cloud-based cybersecurity.

  • Artificial Intelligence and Machine Learning: Cybersecurity Advances

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.

  • Ransomware: Everything You Need to Know

    Sponsored by: Cisco Systems, Inc.

    Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.

  • The Ultimate Guide to Cybersecurity to Drive Profitability

    Sponsored by: Cisco Systems, Inc.

    This e-book explores how to turn cybersecurity success into a true competitive advantage that enables faster innovation. Discover how to secure your network to prevent costly downtime, equipment damage, compliance issues and more. Plus, learn how to leverage threat intelligence to bolster malware defense and improve network visibility.

  • Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

    Sponsored by: Cisco Systems, Inc.

    Should security pros rely on sandboxing as their single point of defense? Discover where sandboxing technology stands today, why it fails to meet the needs of organizations, and what's needed for effective malware analysis.

  • Your Guide to Spotting and Preventing Malware Infection

    Sponsored by: Solarwinds MSP

    Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • 4 Essential Capabilities for Advanced Malware Protection

    Sponsored by: Cisco Systems, Inc.

    Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.

  • Ransomware: Block Attackers with a Layered Defense

    Sponsored by: Cisco Systems, Inc.

    Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.

  • 8 Best Practices To Prevent Your Data From Being Held Hostage

    Sponsored by: Dell SonicWALL

    Discover 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this transcript to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Why Ransomware Attacks Are A Growing Threat To Health IT

    Sponsored by: Cisco

    Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.

  • How to Prevent and Respond to a Healthcare Ransomware Infection

    Sponsored by: Cisco

    In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.

  • Busting the Myth of the Malware “Silver Bullet”

    Sponsored by: Intel Security

    This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.

  • Dissecting the Spora Ransomware: What Makes This Malware Tick?

    Sponsored by: Booz Allen Hamilton

    Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.

  • An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web

    Sponsored by: Booz Allen Hamilton

    Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.

  • Building Trust in a Cloudy Sky

    Sponsored by: Intel Security

    90% of companies now use cloud services, not all of it sanctioned by IT. Moreover, more sensitive data is being stored in the cloud outside the visibility and control of IT. Learn more "Building Trust in a Cloudy Sky."

  • Details on Newly Observed GhostAdmin Botnet

    Sponsored by: Booz Allen Hamilton

    Gain a rare look at the beginnings of a malware threat and learn how Booz Allen Hamilton discovered and identified indicators of compromise for the newly observed GhostAdmin malware and how to protect your enterprise from falling prey to it.

  • Ransomware: What every healthcare organization needs to know

    Sponsored by: Cisco

    In the healthcare industry, information security is critical. It's also a tremendous challenge, now more than ever before. In this e-book, you'll learn about the impact of ransomware on the myriad of networkable devices being used to improve patient care today.

  • How the Houston Astros Protected their Network from Internet Threats

    Sponsored by: ContentKeeper

    Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.