ComputerWeekly.com Research Library

Powered by Bitpipe.com

Hackers Research

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Account Takeover Attacks Are On The Rise

    Sponsored by: PerimeterX

    This video describes everything you need to know about account takeovers and what you can do to prevent them at your organization. It also details recent breach examples from companies like FitBit, Marriott Hotels, Twitter, and more. Tune in to learn more about account takeover attacks.

  • Top 5 Threats to E-commerce Businesses to Address Before the Holiday Season

    Sponsored by: PerimeterX

    With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 holiday attack trends.

  • Threat Intelligence Report November 2019

    Sponsored by: Mimecast

    Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.

  • The Beginner’s Guide to Bug Bounty Programs

    Sponsored by: HackerOne

    In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.

  • Splunk IT Security Predictions 2020

    Sponsored by: Splunk

    Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.

  • The New Era of Fraud: A Bot-Driven Threat

    Sponsored by: F5 Networks

    With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.

  • Are Bots Killing Your Business Intelligence?

    Sponsored by: F5 Networks

    While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.

  • Ransomware Defense Checklist

    Sponsored by: Cisco Umbrella

    The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this lucrative criminal enterprise going away. Our safety checklist will ensure you are ready to defend your organization’s data against these threats. Use this checklist to ensure you are equipped to prevent a future ransomware attack.

  • The Next Wave of Bot-Driven Brute Force Attacks

    Sponsored by: F5 Networks

    With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • GandCrab Ransomware Analysis Report

    Sponsored by: Versa Networks

    A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.

  • Observations From the Front Lines of Threat Hunting

    Sponsored by: Crowdstrike

    This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.

  • Sharpen your Focus on Spear Phishing Attacks in 2019

    Sponsored by: PortSys

    How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.

  • The Practical Security Guide to Prevent Cyber Extortion

    Sponsored by: Panda Security

    What do you do if you are a victim of cyber extortion? Download The Practical Security Guide to Prevent Cyber Extortion for 5 recommendations on how to keep your company safe.

  • GreyEnergy: Dissecting the Malware from Maldoc to Backdoor

    Sponsored by: Nozomi Networks

    GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.

  • Threat Intelligence: Far-Fetched Idea or Must-Have Security Tactic? How Every Ciso Can Make It a Priority

    Sponsored by: Mimecast

    If threat intelligence isn't part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. In this white paper, learn how CISOs can make threat intelligence a priority in their cyber resilience planning.

  • The Hacker Powered Security Report 2019

    Sponsored by: HackerOne

    Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.

  • The Human Factor 2019 Report

    Sponsored by: Proofpoint

    Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    Download this infographic to uncover some key findings from CyberEdge Group's 6th annual Cyberthreat Defense Report.

  • Cisco Cybersecurity Series 2019: Threat Report

    Sponsored by: Cisco Umbrella

    In this 2019 Threat Report, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: What do they reveal about future adversary tactics? Read on for an in-depth analysis, best practices, and trends to watch.

  • Top 3 Telecom Provider Secures Mobile Accounts

    Sponsored by: Shape Security

    A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.

Browse by Report Type: Hackers White Papers | Hackers Multimedia | Hackers IT Downloads

See more topics related to: Hackers

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.