Software  >  

Malicious Logic

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Logic White Papers (View All Report Types)
 
What Healthcare Professionals Need to Know about Bitcoin
sponsored by Commvault
WHITE PAPER: It's important for healthcare organizations to do their preliminary research into bitcoin, so that if a ransomware breach occurs they are able to get back to work. Learn more about bitcoin in this resource and about trends in ransomware.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Commvault

Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Ransomware: All Locked Up and No Place to Go
sponsored by Kaspersky Lab
WHITE PAPER: Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.
Posted: 25 Sep 2017 | Published: 31 Dec 2016

Kaspersky Lab

United Kingdom: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Take a closer look at this brief resource to reveal cyber threat statistics based on company size and industry in the UK.
Posted: 13 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID Global
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

HID Global

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

10 Simple Tips to Protect Yourself from Ransomware
sponsored by Acronis
WHITE PAPER: Inside, learn 10 tips as to how you can optimize your backup system to help defend against the ransomware threat
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Acronis

Ransomware Infection to Encryption in Three Seconds
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This resource will prepare your organization for a ransomware attack by providing you with key insights on ransomware's unique nature, info on ransomware's rapid infection and encryption and best practices for blocking ransomware before it attacks.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement