ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • The Mobile Risk Matrix

    Sponsored by: Lookout

    Download this mobile risk matrix to gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities to your organizations' apps, devices, network, web and content.

  • The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility

    Sponsored by: Lookout

    Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.

  • Mr. Robot and Today's New Data Protection

    Sponsored by: Reduxio

    Read this white paper to learn about a data protection technology that uses point-in-time copying techniques like split-mirror backups and snapshots to keep your company safe from malware that could hold your information hostage.

  • Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

    Sponsored by: Gigamon

    Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.

  • Why Backup is Broken

    Sponsored by: SolarWinds, Inc.

    Learn how to address the vulnerability created by broken backup, and what the restoration revolution will look like. Also discover the obstacles to efficient backup, why backup is slow and unreliable, and more.

  • Your Guide to Mitigating Phishing Attacks

    Sponsored by: PhishMe

    As one of the most persistent types of attacks, spear-phishing cannot be ignored. Discover the importance of implementing an incident response program that directly tackles phishing attacks.

  • 4 Countermeasures to Protect Against Ransomware

    Sponsored by: TrendMicro

    Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.

  • Malware Year in Review 2016

    Sponsored by: PhishMe

    Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.

  • Analyzing the Malware Threat

    Sponsored by: Symantec & Blue Coat Systems

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • Data Breaches and the Great Security Disconnect

    Sponsored by: PhishMe

    Access this infographic now to learn how to bolster your existing security measures with tools that address growing cyberthreats and empower your employees to be part of the solution.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • Ransomware Infection to Encryption in Three Seconds

    Sponsored by: Arctic Wolf Networks, Inc.

    This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.

  • How Fortinet Security Fabric Addresses Today's Top Security Concerns

    Sponsored by: Fortinet, Inc.

    In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.

  • Effective Business Bandwidth Management

    Sponsored by: GFI

    Explore how to maximize your network's performance by addressing the blind spots that devices like bandwidth shapers and traditional performance management tools overlook.

  • Ransomware: The Most Profitable Malware in History

    Sponsored by: Cisco Umbrella

    Learn how to combat ransomware with four resources, including a blog post that details ransomware's past, present and future and a slideshow of ten shocking new facts about ransomware.

  • What's Driving Ransomware Attacks and How Should You Respond?

    Sponsored by: Cisco Umbrella

    VP of Research at Gartner and leading authority on endpoint and server protection strategies, Peter Firstbrook, and Cisco Umbrella's CTO, Dan Hubbard, address the explosion of ransomware in the market and the simplest way for security practitioners to stay ahead of these attacks in this webcast.

  • Ransomware Defense for Dummies

    Sponsored by: Cisco Umbrella

    This Ransomware Defense For Dummies consists of five chapters that explore all you need to know to protect yourself from a costly ransomware attack.

  • Waste Less Time Fighting Ransomware

    Sponsored by: Cisco Umbrella

    In this resource, learn if Cisco's Umbrella can really block ransomware.

  • Information Protection in the Web and Cloud Era

    Sponsored by: Symantec & Blue Coat Systems

    Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.

  • 15 Endpoint Security Suites Compared

    Sponsored by: Symantec & Blue Coat Systems

    Access Forrester's 25-criteria evaluation of endpoint security suite providers to learn market trends and uncover how 15 vendors match up.

  • Safe Adoption of Cloud Applications

    Sponsored by: Symantec & Blue Coat Systems

    Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.

  • A Network Manager's Guide to Ransomware

    Sponsored by: Cisco Umbrella

    In this Network Manager's Guide to Ransomware, learn how to protect your infrastructure from sophisticated, complex attacks.

  • Healthcare Ransomware Attack: Prevention and Backups Are Critical

    Sponsored by: Cisco Umbrella

    In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.

  • Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data

    Sponsored by: Cisco Umbrella

    Ransomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.