Research Library

Powered by

Malware Research

  • Threat Predictions

    Sponsored by: Fortinet, Inc.

    As technology continues to evolve, there is a growing criminal element looking to exploit new opportunities the digital society brings. This white paper reveals predictions regarding the future threat landscape, offers insight into specific threats, and provides mitigation tactics to enhance security.

  • Threat Ladscape Report

    Sponsored by: Fortinet, Inc.

    According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.

  • Potentially Dangerous User Accounts Identitifed

    Sponsored by: Janrain

    A company's brand can be severely damaged when fraudulent accounts are created on digital properties with spam, phishing, and program abuse. This data sheet provides insight into protecting your web applications from fraud and various other cyberattacks.

  • Internet Security Threat Profile in Numbers

    Sponsored by: Symantec

    Which industries receive the most email attacks, including malware, phishing and spam?

  • Extend DLP to the Cloud

    Sponsored by: Symantec

    This solutions brief provides insight into a data loss prevention strategy combined with cloud access security broker in order to advance your cloud security posture.

  • Email Threats: An ISTR Special Report

    Sponsored by: Symantec

    According to the ISTR Email Threats Report, approximately 8,000 businesses each month are targeted by BEC scams. Explore this ISTR Special Report to uncover staggering email threat statistics, including insight into emails infected with malware, spambots, spam, and more.

  • How to Avoid Being the Victim of a Data Breach

    Sponsored by: Evident

    There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.

  • Security Roundup: The Cost of Compromise

    Sponsored by: TrendMicro

    Oftentimes, incidents can be attributed to lapses in security within companies, and a failure to secure systems is far-reaching and expensive. This security roundup provides a review of the data and trends set by relevant current events, specifically focusing on WannaCry and Petya ransomware, the IoT botnet Persirai, and business email compromise.

  • Veeam's 3-2-1 System for Countering Ransomware

    Sponsored by: Veeam Software

    In this white paper, learn about the 3-2-1 principle of backup, as well as a system which is built around this strategy to deliver comprehensive ransomware protection by providing tight integration with industry leading storage vendors, WAN acceleration and encryption, and more.

  • How to Handle a Ransom Driven DDoS Attack

    Sponsored by: Corero Network Security

    Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.

  • The Hunt for IoT

    Sponsored by: F5 Networks

    30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots across the globe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

  • Go From Compromise to Containment - Fast

    Sponsored by: Rapid 7

    According to the Verizon Data Breach Investigations Report, stolen credentials are the number one threat vector across all data breaches. Watch this webcast to uncover how you can detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing.

  • Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive

    Sponsored by: Juniper Networks, Inc.

    In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way.

  • The Evolving Risk Landscape

    Sponsored by: F5 Networks

    There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

  • The Hunt for IoT

    Sponsored by: F5 Networks

    30.6 million IoT brute force attacks were launched from January 1 to June 30 2017, according to F5 Labs. This report provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

  • Protecting the Financial Services Organization

    Sponsored by: Juniper Networks, Inc.

    Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.

  • How Malware Can Steal Your Data

    Sponsored by: F5 Networks

    51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.

  • Busting the Myth of the Malware "Silver Bullet"

    Sponsored by: McAfee, Inc.

    Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.

  • Discover an Advanced Cloud-Based Threat Prevention Suite

    Sponsored by: Juniper Networks, Inc.

    Inside this tech overview, learn about Sky Advanced Threat Prevention, a cloud-based service with features built to adapt to the ever-changing threat landscape and fend off today's ransomware and DDoS attacks.

  • Top Cybercrime Threats to Financial Institutions

    Sponsored by: Digital Shadows

    The most prevalent cybercrime threats against financial institutions are: the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking Trojans. Take a look at this white paper to learn more about these financial threats that stem from cybercriminals.

  • The Need for Automotive Cybersecurity Testing Standards

    Sponsored by: Synopsys

    Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.

  • Peak Retail Season Threats to Look for

    Sponsored by: Booz Allen Hamilton

    During the holiday season, cybercriminals prepare attacks on retailers everywhere in the hopes the retailers will pay ransom to ensure their websites are running smoothly for peak holiday hours. This threat report reveals the top threats ranked by security and likelihood that websites will face during peak retail season.

  • Outsmarting Malware

    Sponsored by: Juniper Networks, Inc.

    Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.

  • Top-of-Mind Threats and Their Impact on Endpoint Security Decisions

    Sponsored by: Cylance

    According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    Sponsored by: One Identity

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.