ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • The Cyber Threat Guide

    Sponsored by: LogicNow

    This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.

  • Incident Response

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.

  • Market Analysis for 18 Featured Endpoint Protection Platforms

    Sponsored by: Trend Micro

    Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • State of the Internet Report Q3 2016

    Sponsored by: Akamai

    This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.

  • State of the Internet Executive Summary

    Sponsored by: Akamai

    This report shows you up-to-date statistics on cybersecurity. Better enable your business to make intelligent, strategic decisions based on the information you'll learn.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Mitigate Security Risks with Hyperconverged Infrastructure

    Sponsored by: SimpliVity

    Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.

  • From Reactive to Proactive: How to Avoid Alert Fatigue

    Sponsored by: ThreatConnect

    Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.

  • IoT Guardian for the Healthcare Industry

    Sponsored by: Zingbox

    Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.

  • Four Countermeasures to Protect Against Ransomware

    Sponsored by: Trend Micro

    Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.

  • Best Practices for Ransomware Detection and Remediation

    Sponsored by: Arctic Wolf Networks, Inc.

    Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • Remove the Security Blind Spots Created by Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.

  • Conquer Threats with Collaborative, Scalable Security Intelligence

    Sponsored by: IBM

    Meet new and sophisticated security threats head-on with adaptable SIEM tools that can scale as your organization does. Discover the power to act at scale with a fast and easy, cost-effective method to meet changing security needs.

  • The business of Ransomware: What every CXO should know

    Sponsored by: Code42

    Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.

  • Insider’s Guide to Defeating Ransomware: Protect Your Data at its Source

    Sponsored by: Imperva

    Given the speed at which ransomware impacts organizations, security teams need to detect ransomware at the earliest stage possible. Learn how monitoring access to data on corporate file shares in real time can help you efficiently detect suspicious file modifications, allowing you to detect -- and block -- a ransomware attack.

  • 2016 Global Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.

  • Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation

    Sponsored by: Akamai

    Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.

  • Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond

    Sponsored by: Trustwave

    Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.

  • Managed Security Services Provider (MSSP) Decision Guide

    Sponsored by: Trustwave

    What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.

  • Threats and Mitigations: A Guide to Multi-Layered Web Security

    Sponsored by: Akamai

    Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.

  • Build a Defense-in-Depth Security Approach

    Sponsored by: TrendMicro

    Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.

  • Do You Need Malware Protection on a VDI Thin Client?

    Sponsored by: Dell, Microsoft and Citrix

    There are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.