ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Cybersecurity Benchmarking & Security Performance Management

    Sponsored by: BitSight

    A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.

  • Real-Time Automated Endpoint Security

    Sponsored by: enSilo

    enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.

  • Surviving Advanced Targeted Attacks By Augmenting (Or Replacing) Legacy AV With Ensilo

    Sponsored by: enSilo

    Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.

  • Instant Security Maturity Assessment

    Sponsored by: CrowdStrike

    In this resource, learn about CrowdStrike's Falcon Complete which fuses machine intelligence with human intervention to prevent breaches. Falcon Complete operationalizes your organization against malware, ransomware and fileless attacks. Download the resource to explore the benefits.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Trend Micro, Inc.

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Stripping The Malware Threat Out Of Powershell With Ensilo

    Sponsored by: enSilo

    While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.

  • Reducing Email Security Costs

    Sponsored by: Mitigate Solutions - Mimecast

    Download this solution brief to learn how Mimecast Email Security can help protect your organization's employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance.

  • A Best Practice Guide to Mitigating Ransomware in Your Enterprise

    Sponsored by: ManageEngine

    One of the most lethal forms of cyberattacks, ransomware, can disrupt the most powerful institutions in the world, from government organizations to Fortune 500 companies. In this white paper, learn 4 simple best practices that your organization can implement to help prevent ransomware attacks.

  • Cloud in the Crosshairs

    Sponsored by: NetScout Systems, Inc.

    In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.

  • Dawn of the Terrorbit Era

    Sponsored by: NetScout Systems, Inc.

    The global cyberthreat landscape continues to evolve, unleashing increasingly sophisticated and persistent attack techniques at internet scale. In this NETSCOUT Threat Intelligence report, explore key findings.

  • Missing Cyberhygiene: Ransomware – Curse and Cure

    Sponsored by: Open Systems Technologies

    Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.

  • IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment

    Sponsored by: NetScout Systems, Inc.

    Distributed denial-of-service (DDoS) attacks are increasingly complex. Even though DDoS prevention technologies are more mainstream than a few years ago, choosing the right vendor or service is challenging. In this research report, explore an assessment of providers offering DDoS prevention and mitigation technologies and services.

  • Exploring the Past, Present, And Future of Blockchain Technology

    Sponsored by: Armor

    Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.

  • Miners in the Shadows: Extracting Treasure with Stolen Resources

    Sponsored by: Cisco Umbrella

    Malicious cryptomining lets cybercriminals profit at your organization's expense. Find out who they're targeting and how to protect your network.

  • Malicious Cryptominers are Eyeing Your Resources.

    Sponsored by: Cisco Umbrella

    Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.

  • Protect Your Organization From Unwanted Cryptomining

    Sponsored by: Cisco Umbrella

    Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.

  • Ransomware Galore: The Four You Shouldn't Ignore

    Sponsored by: Cisco Umbrella

    Ransomware is a growing issue that isn't going away anytime soon. Most organizations have already renewed their focus on data backup and recovery. But beyond that, do you know what your top defensive priorities should be? In this white paper, explore 4 things your organization must do to defend against ransomware.

  • Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime

    Sponsored by: Unitrends

    This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.

  • 2019 SonicWall Cyber Threat Report

    Sponsored by: SonicWall

    To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence via the 2019 SonicWall Cyber Threat Report. Download the report to discover shocking revelations from the SonicWall Capture Lab threat researchers today.

  • Detect More Threats With Next Generation Antivirus

    Sponsored by: SonicWall

    Discover the benefits and capabilities of Sonic Wall Capture Client.

  • Ransomware Defense and Survival

    Sponsored by: Veeam Software

    This e-book digs deep into the scope, impact, and intricacies of ransomware, and includes a detailed discussion on effectively fighting it and the unexpected costs of recovery. Download it now to put the above to use in your organization and to learn 7 standard operating procedures for responding to an attack.

  • Why Your Company Needs Third-Party Security for Office 365

    Sponsored by: Symantec

    Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.

  • Break the Link Between Users and Cyber Threats

    Sponsored by: Avast Business

    Because SMBs rarely have the resources to build intricate anti-malware solutions, your organization is uniquely positioned to step in and offer those necessary security layers. This white paper highlights a secure web gateway (SWG) that can help you do so. Read on for 5 main benefits and how it delivers added value for service providers.

  • 5 Ways Ransomware Attacks Backup Software

    Sponsored by: Cohesity

    It's important to keep five critical considerations in mind when you're strategizing how best to prevent, detect, and rapidly respond to a ransomware attack on your backups. View them in this resource.

  • Verizon Risk Report

    Sponsored by: Verizon

    Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.