Malware Research
-
Cryptojacking Attacks May Not Challenge Ransomware Dominance
Sponsored by: Cisco UmbrellaCryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
-
How to Prevent Cloud Cryptojacking Attacks on your Enterprise
Sponsored by: Cisco UmbrellaCloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
-
Enterprises Wear Large Targets in Cloud Cryptomining Hacks
Sponsored by: Cisco UmbrellaCryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
-
By the Numbers: Ransomware and Patient Data Breaches in Health IT
Sponsored by: Cisco UmbrellaTake a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
-
Ransomware Attacks Plaguing Health IT
Sponsored by: Cisco UmbrellaLearn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
-
Fundamentals of Endpoint Security: Anti-Malware Protection
Sponsored by: CitrixAccess this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
-
The Evolution of ADC
Sponsored by: CitrixExplore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
-
Build Multilayered Defense for the Cloud and Endpoints
Sponsored by: ConvergeOneCreating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
Building the Best Backup Plan for Today's Storage Environment
Sponsored by: Iron MountainIn this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
Privileged Account Security
Sponsored by: CyberArk55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
-
How Ransomware Attacks have Changed
Sponsored by: CyberArkTake a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
-
Why Healthcare Ransomware Attacks are a Growing Threat to Health IT
Sponsored by: Cisco UmbrellaThere are several factors that leave hospitals vulnerable to ransomware attacks, including the use of legacy systems and the fear of financial penalties due to a data breach. Discover some of the reasons why healthcare systems are experiencing more frequent and costly ransomware attacks.
-
Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
Sponsored by: Cisco UmbrellaUncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
-
How Hospitals Can Combat Ransomware Attacks
Sponsored by: Cisco UmbrellaLearn what separated WannaCry from other ransomware attacks, as well as what hospitals can and should be doing to combat future ransomware attacks.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
Ransomware and Cloud Security: Keys to Stop the Threat
Sponsored by: Cisco UmbrellaHighly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
-
Securing DNS: What to Do, and What to be Aware of
Sponsored by: Cisco UmbrellaIn order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
-
Is the Endpoint Security Nightmare Ending?
Sponsored by: TechTarget SecurityIn our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.