All resources sponsored by:

Cylance

1 - 25 of 34 Matches
Assault On Healthcare
sponsored by Cylance
WHITE PAPER:The expanded availability of patient data has fueled a meteoric rise in cyberattacks. In this white paper, learn more about why the healthcare environment is a perfect storm of vulnerabilities, and how putting AI in command of cybersecurity can better detect malware and prevent attacks.
Posted: 05 Oct 2018 | Published: 05 Oct 2018
Get This Now


Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE:With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018
Get This Now


Tufts Medical Center Takes on Cybersecurity
sponsored by Cylance
CASE STUDY:In this case study, learn how Tufts Medical Center adopted cybersecurity platforms to identify previously undetected malicious files and malware, and allowed the organization's focus to remain on delivering safe patient care.
Posted: 04 Oct 2018 | Published: 04 Oct 2018
Get This Now


Securing Medical Technology Devices from 21st Century Cybercriminals and Malware Attacks
sponsored by Cylance
WHITE PAPER:With over one billion visits per year, healthcare databases represent a uniquely rich attack surface for cybercriminals. In this white paper, you'll uncover the issues with classical malware approaches for medical technology devices and how AI and machine learning can be used to reduce the risks of cyberthreats to medical technology devices.
Posted: 03 Oct 2018 | Published: 03 Oct 2018
Get This Now


The Medical Device Paradox: Hospital Systems Race Against Time to Close the Patient Safety Cyber Gap
sponsored by Cylance
WHITE PAPER:In this white paper, learn about the growing paradox of medical device efficacy and the trends in medical device vulnerability and cybersecurity. Find out why your hospital system needs to consider an endpoint protection platform to proactively prevent the execution of advanced persistent threats and malware.
Posted: 03 Oct 2018 | Published: 31 Dec 2017
Get This Now


How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT:This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018
Get This Now


5 Categories of Questions for Evaluating AI-Driven Security Tools
sponsored by Cylance
WHITE PAPER:With countless numbers of security tools boasting "AI and machine learning capabilities," AI has become something of a buzzword in the security world. But sometimes, there's some truth to the hype. Get tips on how to effectively evaluate AI-based security tools by learning about 5 useful categories of questions to ask.
Posted: 29 Aug 2018 | Published: 29 Aug 2018
Get This Now


The Predictive Advantage against Malware: It's About Time
sponsored by Cylance
RESOURCE:Find out how preventative, proactive security platforms like CylancePROTECT can help combat against increasingly advanced malware threats – both known and unknown.
Posted: 29 Aug 2018 | Published: 29 Aug 2018
Get This Now


Competitive System Resource Impact Testing
sponsored by Cylance
WHITE PAPER:Download this whitepaper for a look at the several tests conducted to determine the impact on a computer system and the user's ability to perform several common actions and their impact while detecting and quarantining malware. Read on to see the results.
Posted: 27 Aug 2018 | Published: 27 Aug 2018
Get This Now


InSecurity Podcast: Clint Watts on Social Media Manipulation
sponsored by Cylance
PODCAST:Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by special guest Clint Watts, author and MSNBC national security contributor, as they discuss cyberattacks and hackers in the social media world.
Posted: 27 Aug 2018 | Premiered: Jun 18, 2018
Get This Now


InSecurity Podcast: Mark Weatherford on 10 Ways to Earn Quality Time With a CISO
sponsored by Cylance
PODCAST:In this podcast, Mark Weatherford, SVP and Chief Cybersecurity Strategist at vArmour, shares the 10 ways to earn quality time with a CISO. Listen in and you'll be surprised how successful you can be simply sticking to these rules.
Posted: 24 Aug 2018 | Premiered: Aug 23, 2018
Get This Now


InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
sponsored by Cylance
PODCAST:Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by Katie Moussouris, CEO of Luta Security, to talk about bugs, bug bounties and their impact on security and privacy.
Posted: 24 Aug 2018 | Premiered: Aug 13, 2018
Get This Now


Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE:Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


Hospital Had Backups, Paid Ransom Anyway
sponsored by Cylance
CASE STUDY:Every enterprise with sensitive data can fall victim to a ransomware attack like SamSam. This case study explores how enterprises with sensitive or important data should make backups and address how they implement their remote desktop protocol (RDP). Read on to understand the value RDP has to offer when used correctly.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


How to Hack into an Instagram Account
sponsored by Cylance
RESOURCE:Nearly 3/4 of American businesses use Instagram for marketing purposes, according to eMarketer. Learn how to prevent Instagram attacks by thinking like a social media hacker.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


Top 4 Things to Consider when Choosing a Next-gen Endpoint Security Solution
sponsored by Cylance
RESOURCE:If you are making the move to a next-gen endpoint security solution to improve your team's efficiency, meet government mandates or other reasons, this resource highlights 4 characteristics to consider before making a selection.
Posted: 12 Jun 2018 | Published: 12 Jun 2018
Get This Now


What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO:Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017
Get This Now


Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO:Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018
Get This Now


Hacking Exposed - Attacker Methods and Tactics
sponsored by Cylance
WEBCAST:This webinar covers techniques used to exploit weaknesses in traditional security solutions, and the tactics and tools adversaries use to gain access to vital systems and data.
Posted: 07 Jun 2018 | Premiered: Mar 15, 2018
Get This Now


Think beyond the traditional approach to security
sponsored by Cylance
VIDEO:Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.
Posted: 07 Jun 2018 | Premiered: 30 Jan 2018
Get This Now


Safelite Takes on Cybersecurity
sponsored by Cylance
CASE STUDY:Find out how Safelite used artificial intelligence to predict, detect, and prevent malware before it could ever execute.
Posted: 06 Jun 2018 | Published: 31 Dec 2017
Get This Now


How a Children's Hospital Found the Medicine for Endpoint Security
sponsored by Cylance
CASE STUDY:This case study explores how Phoenix Children's Hospital and its IT security team prevents malicious activity targeting their 5,000 endpoints before it can endanger sensitive patient and payment information and hospital operations.
Posted: 06 Jun 2018 | Published: 06 Jun 2018
Get This Now


The Secret to Combating Fileless Attacks
sponsored by Cylance
RESOURCE:Fileless malware is the danger to your system that threat detection methods likely aren't picking up on. Download this resource to learn how to detect fileless malware and for ways to combat a fileless attack.
Posted: 06 Jun 2018 | Published: 06 Jun 2018
Get This Now


Advanced Endpoint Protection: Cylance Security Value Map
sponsored by Cylance
RESOURCE:In this report, find out how Cylance updated their product software and how the update impacted their security effectiveness score and protected agent value.
Posted: 06 Jun 2018 | Published: 06 Jun 2018
Get This Now


SE Labs Predictive Malware Response Test
sponsored by Cylance
ANALYST REPORT:Uncover findings from SE Labs predictive malware response testing, and learn how an AI technology at the heart of an endpoint protection platform can keep your organization safe from zero-day attacks.
Posted: 05 Jun 2018 | Published: 05 Jun 2018
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement