Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
The Medical Device Paradox: Hospital Systems Race Against Time to Close the Patient Safety Cyber Gap
sponsored by Cylance
WHITE PAPER: In this white paper, learn about the growing paradox of medical device efficacy and the trends in medical device vulnerability and cybersecurity. Find out why your hospital system needs to consider an endpoint protection platform to proactively prevent the execution of advanced persistent threats and malware.
Posted: 03 Oct 2018 | Published: 31 Dec 2017

Cylance

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

AlienVault

Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO: Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018

Cylance

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Dell SecureWorks

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Did you know that 77.2% of businesses were victim to at least 1 cyberattack in 2017, and 62.3% expect to be targets by the end 2018? Download this Cyberthreat Defense Report resource and uncover more key results.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Only You Can Prevent Ransomware, Instead of Falling Victim to It
sponsored by Cylance
WHITE PAPER: This white paper can help enterprises better understand the current threat landscape and how to stay protected against growing ransomware attacks.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

Cylance

Understanding Cyberattacks
sponsored by Panda Security
WHITE PAPER: It is critical to understand the cyber-kill chain for identifying threats throughout the different stages of an attack lifecycle. There are 7 basic steps to the cyber-kill chain. Download this white paper to discover details on all of them to halt cyberattacks in their tracks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

The CIO's Guide to Beating Ransomware and Staying Available
sponsored by Veeam Software
WEBCAST: In this webinar, join Rick Vanover, Director of Technical Product Marketing, and other experts at Veeam as they share practical tips on ensuring you're resilient to the ransomware threat where it matters most: backup and DR. Tune into the 12:14 mark to jump to ransomware prevention and response.
Posted: 27 Aug 2018 | Premiered: Jul 10, 2017

Veeam Software

Granite Ridge Builders Protect Their Data from Ransomware with Acronis
sponsored by Acronis
CASE STUDY: Read this study to see the rest of Granite Ridge's story, which involves a bare-metal backup solution that protects their data from hardware failures, automates both on-site and off-site backups, supports agentless backup of Hyper-V, and proactively protected them from a potentially devastating ransomware attack.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

Acronis

Malware, Machine Learning and the Battle to Eliminate Human Error
sponsored by Radware
WHITE PAPER: Find out how IT security teams are taking steps to outsmart malware and cyberattacks with machine learning.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement