ComputerWeekly.com Research Library

Powered by Bitpipe.com

Hackers Research

  • Spear-phishing Analysis with ThreatQ Investigations

    Sponsored by: ThreatQuotient

    Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. This webinar provides an analysis of how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.

  • The 5 Most Dangerous New Attack Techniques: Are They Evolving?

    Sponsored by: RSA Conference

    Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • ThreatQ for Healthcare

    Sponsored by: ThreatQuotient

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

  • Datrium Ransomware Protection

    Sponsored by: Datrium

    A recent study found that 1 in 2 companies have suffered a DR event in the past 2 years—and half of those from ransomware. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.

  • CIO Trends #10: Nordics

    Sponsored by: ComputerWeekly.com

    Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.

  • CIO Trends #10: Benelux

    Sponsored by: ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

  • Top APAC security predictions for 2020

    Sponsored by: ComputerWeekly.com

    Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.

  • Top IT Predictions in APAC 2020

    Sponsored by: ComputerWeekly.com

    As the new decade dawns, we wanted to look ahead at the technologies likely to dominate the Asia-Pacific IT landscape in 2020.

  • Closing the Website Security Gap: Why a WAF Is Not Enough

    Sponsored by: Tala Security

    Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.

  • Your Email Security is Ineffective, and Getting Worse

    Sponsored by: Ironscales

    The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.

  • Why Your Business Needs to Implement Web Security Standards

    Sponsored by: Tala Security

    With web-based attacks on e-commerce growing in volume and complexity, businesses need to fine-tune their website security tactics to avoid a major breach. This white paper highlights the current website security landscape and provides best-practices for future-proofing your business.

  • How to Conquer Phishing? Beat the Clock

    Sponsored by: Ironscales

    Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.

  • The Missing Link in Website Security

    Sponsored by: Tala Security

    Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.

  • Top 6 Reasons to More Carefully Consider Client-Side Security

    Sponsored by: Tala Security

    As online channels for retail grow in popularity, so too do the risks associated with attackers stealing personal and financial data. In this white paper, discover the top 6 reasons why you should more carefully consider enhancing client-side security.

  • The Silent E-Commerce Sales Killer: Customer Journey Hijacking

    Sponsored by: The Media Trust

    One of the most critical aspects of digital retail is ensuring a seamless, tailored shopper experience. While e-commerce leaders invest resources into ensuring this, the conversion rate from site visit to sale is just 2.86%. In this article, explore how customer journey hijacking is redirecting your customers and how to protect against this.

  • The Seven Essentials of a Modern Email Security Platform

    Sponsored by: Ironscales

    Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.

  • The Weakest Link

    Sponsored by: Area 1 Security

    Phishing attacks are growing increasingly complex. Hackers are now targeting affiliates within an organization’s digital supply chain as an entry point into their target’s network. In this white paper, uncover tactics used in past supply chain phishing attacks and learn how to detect and mitigate these threats.

  • Why Secure Email Gateways Fail to Catch Phish

    Sponsored by: Area 1 Security

    Phishing attacks are becoming difficult for secure email gateways (SEGs) to detect and mitigate, leading to resource-intensive remediation efforts. But why are SEGs failing? This e-book goes in-depth into why SEGs are ineffective at catching phishing attacks and explores what you can do to improve your email security.

  • Whack-a-phish

    Sponsored by: Area 1 Security

    Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.

  • Top 10 ASEAN IT stories of 2019

    Sponsored by: ComputerWeekly.com

    Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.

  • Application Shielding with Intertrust whiteCriterion Code Protection

    Sponsored by: Intertrust

    Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Account Takeover Attacks Are On The Rise

    Sponsored by: PerimeterX

    This video describes everything you need to know about account takeovers and what you can do to prevent them at your organization. It also details recent breach examples from companies like FitBit, Marriott Hotels, Twitter, and more. Tune in to learn more about account takeover attacks.

Browse by Report Type: Hackers White Papers | Hackers Multimedia | Hackers IT Downloads

See more topics related to: Hackers

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.