Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Threats Reports
 
Mr. Robot and Today's New Data Protection
sponsored by Reduxio
WHITE PAPER: Read this white paper to learn about a data protection technology that uses point-in-time copying techniques like split-mirror backups and snapshots to keep your company safe from malware that could hold your information hostage.
Posted: 21 Jun 2017 | Published: 09 Jan 2017

Reduxio

How to Protect Against Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: What does a typical ransomware attack look like? What security solutions should be in place to give the best possible defense? Discover the critical security technologies that every IT setup should include to thwart today's ransomware.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Sophos, Inc.

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

France: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Which industries in France are attacked most for malware, phishing and spam?
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
WEBCAST: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017

Commvault

Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
sponsored by Cisco Umbrella
WHITE PAPER: Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Cisco Umbrella

Windows Defender: Advanced Threat Protection (ATP)
sponsored by Microsoft
RESOURCE: In this resource, learn how Windows Defender ATP can help the ability to detect and remediate advanced attacks and data breaches on your networks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

Unknown Threat Detection Platform
sponsored by OPSWAT inc
WEBCAST: Protecting potentially harmful code is essential when securing your data. Watch this webcast to uncover how to block unknown threats and detect outbreaks.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement