Research Library

Powered by

Malware Research

  • Security for the Internet of Radios Real Threats, Right Now, Ready or Not

    Sponsored by: Bastille Network Inc

    Discover the future IoT threats and how you can sure up your defenses now to be ready for the future. Learn why current wireless protection tools won't get the job done and what to look for in a competent IoT security solution.

  • Forrester Names Carbon Black a “Leader” in Endpoint Security

    Sponsored by: Carbon Black

    Discover which endpoint security provider Forrester determine was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.

  • DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)

    Sponsored by: Carbon Black

    Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.

  • Endpoint Security Suite Evaluations

    Sponsored by: Carbon Black

    In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.

  • Security Intelligence Services for Advanced Threat Detection and Resolution

    Sponsored by: Kaspersky Lab

    This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they can have a negative impact on your organization.

  • Closing the Circle of Network Defense with Threat Intelligence

    Sponsored by: Kaspersky Lab

    This white paper explores how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.

  • IT Security 101: Thinking Like a Cybercriminal?

    Sponsored by: LogicNow

    Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.

  • Building a Security Fabric for Today's Network

    Sponsored by: Fortinet, Inc.

    Your firewall technology must evolve as fast as your borderless enterprise. Discover how to reduce complexity while increasing security effectiveness. Learn how to consolidate network security technologies across your entire infrastructure to receive high levels of reliable network performance throughout your extended perimeter.

  • 12 Hours: The Hour-By-Hour Breakdown of Threat Actors Inside Your Environment

    Sponsored by: Armor

    This infographic shows you an hour by hour breakdown through the typical "secure" environment so you can better understand how threat actors carry out their dastardly deeds. By knowing them better and drafting your own plan of attack, you can best prepare yourself to fight back against cyber fiends.

  • The Evolution of Locky Ransomware's Javascript Downloaders

    Sponsored by: Booz Allen Hamilton

    Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.

  • Enterprise Security Gets Adaptive

    Sponsored by: Kaspersky Lab

    This paper explores how to implement a more adaptive, integrated approach to app security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help your strategies for defending against advanced persistent threats (APTs) become more proactive and intelligence-driven.

  • Creating a Secure Infrastructure

    Sponsored by: Oracle Corporation UK Ltd

    Discover how you can gain higher levels of security, efficiency and performance for your data center. Encrypt and decrypt at full speed with zero performance impact and guard against top memory-based attacks.

  • Building an Information Fortress

    Sponsored by: Oracle Corporation UK Ltd

    Discover how to reinvent your security infrastructure into an information fortress. Learn three key steps to improve the security surrounding your enterprise and learn to protect your information at the source.

  • True Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    Discover an alternative to current, ineffective DDoS protection solutions in this short video. See true multi-vector protection and always-on application availability that is also scalable, efficient, and affordable.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • Integrated Security Technology & Management

    Sponsored by: Armor

    Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that designed with integrated security from the ground up.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • 4 Features Your Security Strategy Needs in a Virtual Environment

    Sponsored by: Kaspersky Lab

    This report discusses four features that a virtual desktop infrastructure (VDI) security solution must include. Discover ways to maintain the benefits of virtualization while also meeting the unique needs of VDI.

  • Ultimate Guide to Multi-Vector DDoS Protection

    Sponsored by: A10 Networks

    This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.

  • Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector

    Sponsored by: A10 Networks

    In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Why You Need to Test All Your Cloud, Mobile and Web Applications

    Sponsored by: Trustwave

    Uncover the importance of complete application testing and find recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.