ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Open Share Assessment

    Sponsored by: STEALTHbits

    Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.

  • Akamai’s [state of the internet] Q2 2016 executive review

    Sponsored by: Akamai

    This report shows you statistics based on cybersecurity information gathered from Q2 2016. It's meant to enable businesses and governments to make intelligent, strategic decisions about broadband connectivity and cloud security moving forward.

  • Akamai’s [state of the internet] Q2 security 2016 Report

    Sponsored by: Akamai

    This report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Access now to discover why we've experienced such a dramatic increase in DDoS and web application attacks.

  • Accelerating Digital Transformation with Data-Driven Security

    Sponsored by: Akamai

    This IDC report talks about digital transformation as a top driver for the IT industry and its security implications today. Discover how to keep sensitive files secure and your organization running smoothly even through the shift.

  • SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Kona Client Reputation

    Sponsored by: Akamai

    Discover the business benefits and operational benefits you can achieve by adding a new, advance algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.

  • Incident Response Capabilities in 2016: The 2016 SANS Incident Response Survey

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time and automation. Explore the survey's results in this comprehensive report to uncover critical findings about the current IR landscape, breach environment, and areas that could see improvement in the near future.

  • Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements

    Sponsored by: Gigamon

    This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.

  • Safeguarding Vital Data Is a Battle You Can Win

    Sponsored by: Intel Security

    In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.

  • Guidance on Healthcare Ransomware Attacks

    Sponsored by: OpenDNS

    Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.

  • Five Important Steps to Ransomware Remediation in Health IT

    Sponsored by: OpenDNS

    Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike.

  • Harnessing the Power of Metadata for Security

    Sponsored by: Gigamon

    Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.

  • GigaSECURE Security Delivery Platform

    Sponsored by: Gigamon

    Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.

  • The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

    Sponsored by: SecureWorks

    Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.

  • Deriving Value from the Technical Security Test

    Sponsored by: SecureWorks

    Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Ransomware: Threats, Motivations, and Tools of the Trade

    Sponsored by: Radware

    Today's hackers require less money and time than ever before to start their campaign. Learn more about how marketplace dynamics are shifting the scale of the modern attack landscape, and uncover access to a valuable resource for security professionals.

  • Who Will CAVE First: Likely Targets of Ransomware

    Sponsored by: Radware

    The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility

    Sponsored by: SecureWorks

    Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Trustwave

    There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

  • Recovering From Ransomware Starts with a Data Protection Strategy

    Sponsored by: Dell Software

    Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.

  • How to Protect Data from Ransomware

    Sponsored by: Dell Software

    It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.

  • Reeling in Ransomware Data Protection for You and Your Users

    Sponsored by: Code42

    In this whitepaper, learn how your organization can employ continuous endpoint backup software to negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.