ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Are You Sure You Didn't Authorize Someone You Shouldn't Have?

    Sponsored by: HID

    Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.

  • Protecting the Hybrid Cloud from Advanced Threats

    Sponsored by: TrendMicro

    With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.

  • Endpoint Security Review: Cb Defense

    Sponsored by: Carbon Black

    Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.

  • What is a Non-malware Attack?

    Sponsored by: Carbon Black

    What is a non-malware attack? Uncover a clear definition, along with a quick example that helps to explain exactly what it can do and why it is so dangerous today.

  • Stopping the Next Ransomware Outbreak

    Sponsored by: Carbon Black

    The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.

  • Stopping Malware and Non-Malware Attacks

    Sponsored by: Carbon Black

    Non-malware attacks have quickly become extremely dangerous and prevalent. In 2016, 97% of organizations were targeted by non-malware attacks. Learn how to use endpoint security technologies to combat all forms of cyberattacks, not just malware.

  • 14 Steps to Protect Your Organization from Ransomware

    Sponsored by: Carbon Black

    Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.

  • How Ransomware is Evolving into the Perfect Crime

    Sponsored by: Barkly

    Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.

  • Incident Response for Today's Top 3 Security Scenarios

    Sponsored by: Exabeam

    This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.

  • The Ransomware Survival Handbook

    Sponsored by: Barkly

    This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.

  • How to Detect Unknown Malware and Ransomware

    Sponsored by: Splunk

    Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.

  • IT Pro's Guide to Endpoint Protection

    Sponsored by: Barkly

    Uncover key information on stopping malware and securing your business in this guide to endpoint protection. Discover why endpoint protection is more critical than ever, endpoint attackers' favorite targets, and more.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Sponsored by: Cisco Umbrella

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Securing DNS: What to Do, and What to be Aware of

    Sponsored by: Cisco Umbrella

    In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.

  • Enable Visibility and Protection in the Cloud-Connected Enterprise

    Sponsored by: Cisco Umbrella

    How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.

  • Don't Just Respond – Prevent Attacks before They Happen

    Sponsored by: Cisco Umbrella

    Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.

  • The Cloud Evolution: Top Security Challenges & How to Overcome Them

    Sponsored by: AWS-Trend Micro

    Cloud used to be notorious for falling short when it came to security. This hasn't exactly changed, but we now have security tools that help take care of that. Access this white paper to learn about a technology that tackles three of the top cloud security challenges.

  • Why Firewalls And Antivirus Alone Are Not Enough

    Sponsored by: Cisco Umbrella

    Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives.

  • Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    Take a deeper look at the history of malware attacks and potential countermeasures to thwart new ones. Also uncover 3 major challenges of file share attacks, recommendations to overcome these challenges, and more.

  • Recovering From a "WannaCry" Infection Without Paying

    Sponsored by: Actifio

    Did you get hit with a WannaCry ransomware attack? In this, demo, learn how to easily combat a WannaCry attack by using Actifio to restore your file server to a clean point-in-time and recover your files, without paying any ransom.

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • How to Combat Exploits to Secure Your System

    Sponsored by: Sophos, Inc.

    By blocking the limited number of exploit techniques, you can block a massive number of malware samples in one stroke. Learn about software exploits and how to intercept them before they wreak havoc on your enterprise.

  • How to Ensure You're Not Part of the Next Botnet

    Sponsored by: Sophos, Inc.

    Botnets are a near limitless resource of computing power for hackers. In this white paper learn how to avoid your machines and devices from falling prey to these types of manipulations and shut down this avenue of attack.

  • Improving Endpoint Security and Signature-Based Detection

    Sponsored by: Sentinel Labs, Inc.

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.