Software  >  

Malicious Code

RSS Feed   
Malicious Code White Papers (View All Report Types)
 
A Look Into the Global "Drive-by Cryptocurrency Mining" Phenomenon
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cryptocurrencies were bound to trigger the interest of criminals and it wasn't long before coin mining malware made an appearance. Explore this resource to gain insight into the phenomenon known as "drive-by cryptocurrency mining".
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes

The Benefits of Network Monitoring for Industrial Automation
sponsored by SecurityMatters
WHITE PAPER: Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

SecurityMatters

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

An Intelligent Response to Rising Threats
sponsored by AdvizeX Technologies
WHITE PAPER: This white paper offers an approach to enhancing your current SIEM approach to improve security and protect against ransomware and malware targeting your enterprise's data.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

A New Approach to Defending your Network Against Ransomware
sponsored by Veeam Software
WHITE PAPER: In this white paper, learn how to a concerted backup and disaster recovery process helps in minimizing the damage of ransomware, and some tips on how you can get started.
Posted: 05 Apr 2018 | Published: 31 Mar 2018

Veeam Software

How to Respond to the 2018 Threat Landscape
sponsored by VMware
WHITE PAPER: By 2020, 1/3 of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow IoT. Explore this Gartner report to gain insight into responding to the 2018 threat landscape.
Posted: 12 Apr 2018 | Published: 12 Apr 2018

VMware

Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

BMC

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016

Booz Allen Hamilton

2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016

Neustar

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement