ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Manufacturing Company's AWS Success Story

    Sponsored by: TrendMicro

    If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • The Current Landscape of Advanced Persistent Threats

    Sponsored by: Proofpoint, Inc.

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

  • Deep Security Protection from Ransomware

    Sponsored by: TrendMicro

    Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.

  • Manage risk by protecting apps, data and usage

    Sponsored by: Citrix

    This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.

  • Strategy Guide for Securing the SAP Landscape

    Sponsored by: Onapsis

    Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.

  • Looking for a partner to provide Multi-Factor Authentication?

    Sponsored by: RSA Softcat

    This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.

  • A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security Practitioners

    Sponsored by: LogRhythm, Inc.

    No matter the size of your organization, discover how to fully realize your Security Intelligence objectives through this white paper. You'll learn how to keep your security architecture flexible to adopt and mature capabilities over time and significantly reduce your risk of experiencing costly cyber incidents moving forward.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Day in the Life of a Security Admin

    Sponsored by: RSA Softcat

    Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.

  • Info-Tech Research Group 2015 SIEM Vendor Landscape Report

    Sponsored by: LogRhythm, Inc.

    Discover the effectiveness and simplicity SIEM can bring to threat managmenet for your organization. By integrating with other security technologies, the SIEM solution can act as a single window into the threats and possible breaches that your organization is facing. Learn how to get greater visibility into otherwise hidden threats.

  • MINIMIZING THE IDENTITY ATTACK VECTOR WITH CONTINUOUS AUTHENTICATION

    Sponsored by: RSA Softcat

    Continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.

  • Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches

    Sponsored by: LogRhythm, Inc.

    In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.

  • IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection

    Sponsored by: RSA

    Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Extracting actionable data from banking malware

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

  • SC Mag Reviews a SIEM Platform

    Sponsored by: LogRhythm, Inc.

    Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.

  • How to Detect a Ransomware Attack Before it's too Late

    Sponsored by: LogRhythm, Inc.

    Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.