Research Library

Powered by

Malware Research

  • Protect Against Zero Day Threats and Malware

    Sponsored by: Citrix

    Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing.

  • Give your Web and Cloud Experiences a Security Tune-Up

    Sponsored by: Symantec

    Securing a growing number of devices, operating systems, users and connections is a big challenge. Explore this resource to uncover 7 ways to optimize and get the most out of your secure web gateway.

  • Inside Commvault's Holistic Data Protection Center

    Sponsored by: Commvault

    Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.

  • Five Essential Elements of Next-Gen Endpoint Protection

    Sponsored by: CrowdStrike

    Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.

  • Software-defined Secure Networks

    Sponsored by: Juniper Networks

    According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.

  • Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent

    Sponsored by: Juniper Networks

    In this case study learn how, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.

  • Recovering from Ransomware Solutions Brief

    Sponsored by: StorageCraft Technology Corporation

    Click inside to learn about a program that could give you highly recoverable data to protect you from ransomware attacks by taking immutable snapshots every 10 seconds, individual file recovery, and more.

  • Cyberespionage Campaign Hits Energy Companies

    Sponsored by: SecurityMatters

    What will your company do if the next Dragonfly-type attack targets you? Discover why the implementation of a defense-in-depth strategy is key to successfully mitigate cyberthreats like Dragonfly.

  • The Voice of the Enterprise CISO

    Sponsored by: NSS Labs

    According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.

  • How to Align with the NIST Cybersecurity Framework

    Sponsored by: SecurityMatters

    Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.

  • The Benefits of Network Monitoring for Industrial Automation

    Sponsored by: SecurityMatters

    Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.

  • The Rising Face of Cybercrime: Ransomware

    Sponsored by: BitSight

    This BitSight Insights Report examines the cybersecurity performance of nearly 20,000 organizations in the face of rising ransomware attacks. Uncover the report's 5 key findings about the different types of ransomware attacks across industries like education, government, and finance.

  • Third-Party Risk Management for Financial Services

    Sponsored by: BitSight

    Financial institutions are facing new, sophisticated, and highly dangerous threats from cybercriminals, including ransomware, DDoS attacks, fraud, and identity theft. This resource reveals helpful strategies for third-party risk management to help you protect sensitive data.

  • Mobile Fintech Fraud

    Sponsored by: Simility

    The world is becoming increasingly mobile centric and financial services are no exception. This resource addresses fraud challenges faced by mobile financial services, which can impact profit, reputation and customer loyalty.

  • Integrated Security Operations - The Difference between Knowing and Guessing

    Sponsored by: ServiceNow

    Cyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.

  • Economics of Insecurity

    Sponsored by: Cylance

    Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.

  • Ransomware 101: 3 Keys Ways to Get Started Combating Ransomware

    Sponsored by: Splunk

    Ransomware was recently declared the number 2 most dangerous online threat to consumers and organizations, according to Europol. This white paper offers insight into complex, growing ransomware attacks and reveals 3 tangible steps to combatting ransomware within your organization.

  • Ransomware Defense for Dummies

    Sponsored by: Cisco Umbrella

    Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.

  • The New World of Endpoint Security: Traditional Signature-Based Malware and Virus Protection Can't Keep Up

    Sponsored by: Carousel Industries

    As cyberattacks develop in complexity, traditional anti-virus and malware protection is no longer the most effective security approach. Explore this white paper to gain insight into an advanced endpoint security strategy and how machine learning can enhance malware protection.

  • 2018 Security Predictions for an Unpredictable World

    Sponsored by: Whitehat Securities

    Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.

  • Security within the Financial Services Industry

    Sponsored by: enSilo

    There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.

  • Unified MTD + MARS is the Best Practice for Mobile Security

    Sponsored by: Lookout

    Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.

  • Automated Endpoint Security Realized

    Sponsored by: enSilo

    Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.

  • Broadcast Media Case Study

    Sponsored by: enSilo

    Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.

  • Market Guide for Mobile Threat Defense Solutions

    Sponsored by: Lookout

    Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.