Malware Research
-
Your Guide to Combatting Ransomware's Domination of 2017
Sponsored by: CyberArkLearn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
-
Healthcare Ransomware Attack: Prevention and Backups Are Critical
Sponsored by: Cisco UmbrellaIn this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
-
Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data
Sponsored by: Cisco UmbrellaRansomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.
-
Artificial Intelligence and Machine Learning: Cybersecurity Advances
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
-
SWIFT Banking System Boosts Security Following Cyberattacks
Sponsored by: BAE Systems Applied IntelligenceFollowing a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
-
How to Prevent and Respond to a Healthcare Ransomware Infection
Sponsored by: Cisco UmbrellaIn this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
-
Why Ransomware Attacks Are A Growing Threat To Health IT
Sponsored by: Cisco UmbrellaHealth data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
-
Getting Ahead of Cyber Threats in 2017
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
Do You Need Malware Protection on a VDI Thin Client?
Sponsored by: Dell, Microsoft and CitrixThere are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
-
Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
Sponsored by: KasperskyServer-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
Sponsored by: XeroxIn early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
-
What are Threat Intelligence Services?
Sponsored by: UnisysTo help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.
-
What Are The Security Benefits of Using Thin Client Devices?
Sponsored by: Dell, Microsoft and CitrixThin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.
-
5 Ways to Prevent a Ransomware Infection through Network Security
Sponsored by: IBMEven though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
How to Protect Data from Ransomware
Sponsored by: Dell SoftwareIt can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
-
Ransomware Protection is Futile, but All Hope is Not Lost
Sponsored by: Dell SoftwareDiscover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
5 Steps to Raising Ransomware Resistance
Sponsored by: TechTarget SecurityThis TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
-
Preventing Ransomware Threats to Health Data in 10 Steps
Sponsored by: Cisco UmbrellaHealth data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
-
Blended IT and Security Operations: Where's the Balance?
Sponsored by: ServiceNowWithin this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
-
How To Get the Most Out of SOCs
Sponsored by: ServiceNowThis e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.