Malware Research
-
Network Security: Spotlight on Australia/New Zealand
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Mobile security moving to a unified approach
Sponsored by: TechTarget ComputerWeekly.comThis e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
-
Rise in Ransomware Attacks Prompts New Prevention Priorities
Sponsored by: Cisco UmbrellaOfficials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Ransomware Attacks: How to Get the Upper Hand
Sponsored by: Cisco UmbrellaThe rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
-
Why EDR Technologies are Essential for Endpoint Protection
Sponsored by: TechTarget SecurityWhile an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
-
The Best Email Security Comes Through Strategy and Tactics
Sponsored by: TechTarget SecurityAchieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
-
Crafting a Secure Endpoint Management Strategy
Sponsored by: Vox Mobile SolutionsDownload this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
-
Cryptojacking Attacks May Not Challenge Ransomware Dominance
Sponsored by: Cisco UmbrellaCryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
-
How to Prevent Cloud Cryptojacking Attacks on your Enterprise
Sponsored by: Cisco UmbrellaCloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
-
Enterprises Wear Large Targets in Cloud Cryptomining Hacks
Sponsored by: Cisco UmbrellaCryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
-
By the Numbers: Ransomware and Patient Data Breaches in Health IT
Sponsored by: Cisco UmbrellaTake a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
-
Ransomware Attacks Plaguing Health IT
Sponsored by: Cisco UmbrellaLearn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
-
Fundamentals of Endpoint Security: Anti-Malware Protection
Sponsored by: CitrixAccess this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
-
The Evolution of ADC
Sponsored by: CitrixExplore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
-
Build Multilayered Defense for the Cloud and Endpoints
Sponsored by: ConvergeOneCreating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How Can Privileged Access Accounts Be Managed in Large Companies?
Sponsored by: One IdentityAccording to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
-
Building the Best Backup Plan for Today's Storage Environment
Sponsored by: Iron MountainIn this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
-
Encryption Hiding Malware in Half of Cyber Attacks
Sponsored by: A10 NetworksA Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
-
Privileged Account Security
Sponsored by: CyberArk55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
-
How Ransomware Attacks have Changed
Sponsored by: CyberArkTake a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.