ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • ThreatQ for Government Agencies

    Sponsored by: ThreatQuotient

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Cybercrime Tactics and Techniques: Ransomware Retrospective

    Sponsored by: Malwarebytes

    In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • ThreatQ for Healthcare

    Sponsored by: ThreatQuotient

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

  • Datrium Ransomware Protection

    Sponsored by: Datrium

    A recent study found that 1 in 2 companies have suffered a disaster recovery event in the past 2 years. Businesses can no longer ignore the possibility of attack and should proactively prepare. In this white paper, Datrium highlights the categories of ransomware attacks and how to defend against them. Read on to learn more.

  • The Right Way to Combat Customer Journey Hijacking

    Sponsored by: Tala Security

    Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.

  • Closing the Website Security Gap: Why a WAF Is Not Enough

    Sponsored by: Tala Security

    Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.

  • Your Email Security is Ineffective, and Getting Worse

    Sponsored by: Ironscales

    The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.

  • Why Your Business Needs to Implement Web Security Standards

    Sponsored by: Tala Security

    With web-based attacks on e-commerce growing in volume and complexity, businesses need to fine-tune their website security tactics to avoid a major breach. This white paper highlights the current website security landscape and provides best-practices for future-proofing your business.

  • How to Conquer Phishing? Beat the Clock

    Sponsored by: Ironscales

    Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.

  • Business Email Compromise: The Catalyst for Mailbox Level Email Security

    Sponsored by: Ironscales

    As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.

  • The Missing Link in Website Security

    Sponsored by: Tala Security

    Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.

  • Top 6 Reasons to More Carefully Consider Client-Side Security

    Sponsored by: Tala Security

    As online channels for retail grow in popularity, so too do the risks associated with attackers stealing personal and financial data. In this white paper, discover the top 6 reasons why you should more carefully consider enhancing client-side security.

  • The Silent E-Commerce Sales Killer: Customer Journey Hijacking

    Sponsored by: The Media Trust

    One of the most critical aspects of digital retail is ensuring a seamless, tailored shopper experience. While e-commerce leaders invest resources into ensuring this, the conversion rate from site visit to sale is just 2.86%. In this article, explore how customer journey hijacking is redirecting your customers and how to protect against this.

  • The Seven Essentials of a Modern Email Security Platform

    Sponsored by: Ironscales

    Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.

  • The Weakest Link

    Sponsored by: Area 1 Security

    Phishing attacks are growing increasingly complex. Hackers are now targeting affiliates within an organization’s digital supply chain as an entry point into their target’s network. In this white paper, uncover tactics used in past supply chain phishing attacks and learn how to detect and mitigate these threats.

  • Why Secure Email Gateways Fail to Catch Phish

    Sponsored by: Area 1 Security

    Phishing attacks are becoming difficult for secure email gateways (SEGs) to detect and mitigate, leading to resource-intensive remediation efforts. But why are SEGs failing? This e-book goes in-depth into why SEGs are ineffective at catching phishing attacks and explores what you can do to improve your email security.

  • Whack-a-phish

    Sponsored by: Area 1 Security

    Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.

  • When the Cloud Rains Phish

    Sponsored by: Area 1 Security

    When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.

  • PandaLabs Annual Report 2018

    Sponsored by: Panda Security

    As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.

  • State of the Internet Security: A Year in Review

    Sponsored by: Akamai Technologies

    As the end of 2019 draws near, you can look back and examine the research Akamai has done over the last 12 months. Download the State of the Internet Security report to see the impact various attacks had on organizations in 2019 and how you can prep for 2020.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    An organizations ability to win the cybersecurity battle depends on how well they prevent unknown, zero-day threats. In this white paper, learn how threat prevention technology, and a consolidated security architecture can help to protect your organization’s attack vectors.

  • NEW for 2020: Ransomware Defense for Dummies 2nd Edition

    Sponsored by: Cisco Umbrella

    Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense for Dummies e-book explores the top cybersecurity best practices to reduce ransomware risks. Read the updated e-book to get the latest tips and tricks on how to defend your organization from this rising threat.

  • Account Takeover Attacks Are On The Rise

    Sponsored by: PerimeterX

    This video describes everything you need to know about account takeovers and what you can do to prevent them at your organization. It also details recent breach examples from companies like FitBit, Marriott Hotels, Twitter, and more. Tune in to learn more about account takeover attacks.

  • Top 5 Threats to E-commerce Businesses

    Sponsored by: PerimeterX

    This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 attack trends.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.