Malware Research
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
Extracting actionable data from banking malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
5 Ways to Prevent a Ransomware Infection through Network Security
Sponsored by: IBMEven though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
-
Recovering From Ransomware Starts with a Data Protection Strategy
Sponsored by: Dell SoftwareStopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
-
How to Protect Data from Ransomware
Sponsored by: Dell SoftwareIt can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
-
Ransomware Protection is Futile, but All Hope is Not Lost
Sponsored by: Dell SoftwareDiscover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
5 Steps to Raising Ransomware Resistance
Sponsored by: TechTarget SecurityThis TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
-
Preventing Ransomware Threats to Health Data in 10 Steps
Sponsored by: Cisco UmbrellaHealth data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
-
Blended IT and Security Operations: Where's the Balance?
Sponsored by: ServiceNowWithin this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
-
How To Get the Most Out of SOCs
Sponsored by: ServiceNowThis e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
-
The Current Landscape of Advanced Persistent Threats
Sponsored by: ProofpointIn this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
-
If A Hacker Wants Your Data, Make Sure They Really Work For It
Sponsored by: Carbon BlackThis e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
-
Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
Sponsored by: Check Point Software Technologies Ltd.Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
-
Understand the Hype around Mobile Data Security Threats
Sponsored by: Check Point Software Technologies Ltd.In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
-
Stop Future Threats though Careful Examination of the Malware Lifecycle
Sponsored by: Check Point Software Technologies Ltd.This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
-
Endpoint threat detection gets more response
Sponsored by: Hewlett Packard EnterpriseDiscover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
-
Best Practices for Monitoring Today's Murky Threat Environment
Sponsored by: Hewlett Packard EnterpriseIn today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
-
QRadar: Expert SIEM Product Overview
Sponsored by: IBMLooking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
-
Cybersecurity skills shortage demands new workforce strategies
Sponsored by: IBMThe race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
-
Mobile Data Security Threats: Hype vs. Reality
Sponsored by: LookoutAs threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
-
The Impact of Not Keeping Up with Cybercriminals
Sponsored by: ProofpointOrganizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
-
It's time to tackle IoT security
Sponsored by: Ruckus WirelessThe forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
-
What to Look for in Endpoint Antimalware Tools
Sponsored by: TechTarget SecurityRead this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.