Software  >  

Mobile Malware

RSS Feed   
Mobile Malware Multimedia (View All Report Types)
 
Changing the Rules of Ransomware
sponsored by Dell SecureWorks
VIDEO: Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.
Posted: 01 Oct 2020 | Premiered: 01 Oct 2020

Dell SecureWorks

How Okta's IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
VIDEO: Before the COVID-19 outbreak, few government employees (federal, state and local) had the ability and authorization to work from home. Watch this webinar to learn what the new normal looks like for government agencies, the challenges that have surfaced and best practices for addressing them.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

Security Without Compromise: A New Approach to Eliminating Malware
sponsored by Menlo Security
WEBCAST: 50% of all cyberattacks are based in malware, and 99% of those are driven by email and web attack vectors. How can organizations stay protected? A new way to reduce threats is through a method called ‘isolation.’ Gartner estimates that by 2022, isolation can reduce end-user system attacks by 70%. Interested? Watch this webcast for a closer look.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Enterprise
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Enterprise

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info