ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • What I've Learned from 5,000 Data Breaches

    Sponsored by: AllClear ID

    Learn how to clearly communicate with customers after a data breach to ensure trust remains intact. Minimize confusion and anger by proactively preparing before a major breach occurs. Plan out how affected customers will be notified and supported throughout the entire response process, from notification, to protection, to fraud resolution.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Komerční bankaReducing logins from malware-infected endpoints by90 percent in just three months

    Sponsored by: IBM

    Learn about KB's security struggles and how they were able to mitigate malware attacks with advanced fraud and malware protection. They are now able to detect, block and remediate infections and detect phishing threats before damage can be done to their enterprise.

  • Market Overview: Customer Data Breach Notification And Response Services

    Sponsored by: AllClear ID

    A poorly handled breach notification will do more harm to your organization after a breach. Take charge of customer notification to keep your responses on track. Learn how to best Reassure your customers and the broader public with clear communications and appropriate sensitivity in your messages.

  • Check Point 2015 Security Report

    Sponsored by: Check Point Software Technologies Ltd.

    Based on how bad 2014 was from a cyber security perspective, it's clear that cybercriminals are not slowing down. Read this extensive report that explains the benefits of implementing a three-layer security approach and highlights the threats your enterprise may fall victim to without implementing it.

  • Breach Response: Preparing for the Threat; Controlling the Chaos

    Sponsored by: AllClear ID

    Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyber attack. Other benefits, like good data governance and responsible stewardship, are less tangible, but inspire confidence and can reinforce your good reputation. Discover how to emerge from every data breach unscathed, public image intact.

  • Net Diligence Cyber Claims Study 2014

    Sponsored by: AllClear ID

    This study helps you risk understand the true impact of data insecurity by consolidating claims data from multiple insurers. The combined pool of claims is sizable enough that it allows us to ascertain real costs and project future trends.

  • BitSight Global View

    Sponsored by: BitSight

    This report shows you the security performance results of 250 random organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 1, 2015 until May 1, 2016. It can help your organization's security stance as you move forward into new, global markets.

  • Don’t Let “Trusted” Vendors Become Cyber-Breach Enablers

    Sponsored by: BitSight

    Learn how to evaluate vendors' security ratings simply and effectively. Police vendors entrusted with handling your sensitive data and greatly enhance your vendor risk management program no matter where it is on the maturity curve.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • UK’s Hottest Banking FraudSchemes

    Sponsored by: IBM

    Leading cybersecurity authority Limor Kessem teaches you top fraud threats to UK banking institutions and the impact cybercrime is having on them today. You'll learn top cybercrime trends and the scale at which these practices are growing.

  • EMEA: Rethinking the Cyber Security Disconnect to Save Money

    Sponsored by: VMware

    Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.

  • IBM Security QRadar: SIEM Product Overview

    Sponsored by: IBM

    In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.

  • Cybersecurity skills shortage demands new workforce strategies

    Sponsored by: IBM

    The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.

  • Unlocking the Lucrative Criminal Business Model: An Analyst Report

    Sponsored by: Palo Alto Networks

    Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • IBM Security Trusteer Pinpoint Detect Solution Brief

    Sponsored by: IBM

    You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.

  • Analyze This

    Sponsored by: SAS

    See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.

  • IBM Security Trusteer Fraud Protection Suite solution brief

    Sponsored by: IBM

    Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

  • The Future of Endpoint Protection

    Sponsored by: Atos

    Discover how to best secure your endpoints against today's hostile threat environment. Learn how secure operations, secure technology and secure applications to protect corporate data against physical or digital theft.

  • ‘PowerShell’ Deep Dive: A United Threat Research Report

    Sponsored by: Carbon Black

    Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.