ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Strengthening Ransomware Prevention Through Hardware and Software Security Collaboration

    Sponsored by: Intel

    ESG analysts recommend combining software security tools with hardware-based threat detection to prevent ransomware attacks. Read this ESG Showcase to find out how hardware-based detections work, and to view a potential solution in Intel Threat Detection Technology integrated with Check Point Harmony for comprehensive endpoint protection.

  • How do cybercriminals steal credit card information?

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

  • Your Hybrid Infrastructure Is Under Attack

    Sponsored by: Palo Alto Networks

    In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.

  • Audi fine-tunes its digital performance to boost online car sales

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.

  • The future of storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.

  • Danger within: email and security awareness training strategies for effective account takeover protection

    Sponsored by: Mimecast

    It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

  • Royal Holloway: Man proposes, fraud disposes

    Sponsored by: TechTarget ComputerWeekly.com

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

  • Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection

    Sponsored by: TechTarget ComputerWeekly.com

    Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Mobile security moving to a unified approach

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: TechTarget ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Sandnet++ – A framework for analysing and visualising network traffic from malware

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

  • Extracting actionable data from banking malware

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

  • The future of storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.

  • 5 IAM Trends Shaping the Future of Security

    Sponsored by: Beta Systems

    Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • SMB Cybersecurity: The Need for Better Protection

    Sponsored by: Kaspersky

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

  • Navigating Ransomware Recovery

    Sponsored by: Cisco Umbrella

    The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.

  • Rise in Ransomware Attacks Prompts New Prevention Priorities

    Sponsored by: Cisco Umbrella

    Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: TechTarget Security

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Why EDR Technologies are Essential for Endpoint Protection

    Sponsored by: TechTarget Security

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.