Malicious Computer Code Reports

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Why Ransomware Attacks Are A Growing Threat To Health IT
sponsored by Cisco Umbrella
EGUIDE: Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
Posted: 16 Feb 2017 | Published: 15 Feb 2017

Cisco Umbrella

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018

Citrix

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TechTarget Security

Resource Center: Stop Threats and Prevent Data Loss
sponsored by McAfee, Inc.
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

McAfee, Inc.

It's time to tackle IoT security
sponsored by RUCKUS Networks
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

RUCKUS Networks

Why it's Time for Locked-Down Desktops
sponsored by Dell, Microsoft and Citrix
EGUIDE: Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix