Malware Research
-
Focus ASEAN: Security & Digital Transformation
Sponsored by: TechTarget ComputerWeekly.comWith cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
-
Why Healthcare Ransomware Attacks are a Growing Threat to Health IT
Sponsored by: Cisco UmbrellaThere are several factors that leave hospitals vulnerable to ransomware attacks, including the use of legacy systems and the fear of financial penalties due to a data breach. Discover some of the reasons why healthcare systems are experiencing more frequent and costly ransomware attacks.
-
Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
Sponsored by: Cisco UmbrellaUncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
-
How Hospitals Can Combat Ransomware Attacks
Sponsored by: Cisco UmbrellaLearn what separated WannaCry from other ransomware attacks, as well as what hospitals can and should be doing to combat future ransomware attacks.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
Ransomware and Cloud Security: Keys to Stop the Threat
Sponsored by: Cisco UmbrellaHighly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
-
Securing DNS: What to Do, and What to be Aware of
Sponsored by: Cisco UmbrellaIn order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
-
Is the Endpoint Security Nightmare Ending?
Sponsored by: TechTarget SecurityIn our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
How the Basics of Network Security Have Evolved
Sponsored by: Fortinet, Inc.In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
-
Healthcare Ransomware Attack: Prevention and Backups Are Critical
Sponsored by: Cisco UmbrellaIn this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
-
Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data
Sponsored by: Cisco UmbrellaRansomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.
-
Artificial Intelligence and Machine Learning: Cybersecurity Advances
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
-
SWIFT Banking System Boosts Security Following Cyberattacks
Sponsored by: BAE Systems Applied IntelligenceFollowing a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
-
Why Ransomware Attacks Are A Growing Threat To Health IT
Sponsored by: Cisco UmbrellaHealth data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
-
How to Prevent and Respond to a Healthcare Ransomware Infection
Sponsored by: Cisco UmbrellaIn this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
-
Getting Ahead of Cyber Threats in 2017
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
Do You Need Malware Protection on a VDI Thin Client?
Sponsored by: Dell, Microsoft and CitrixThere are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
-
Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
Sponsored by: KasperskyServer-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
Sponsored by: XeroxIn early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
-
What are Threat Intelligence Services?
Sponsored by: UnisysTo help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.