Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Phishing Factories and Economies: The Real Persistent Threat
sponsored by Akamai Technologies
VIDEO: A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.
Posted: 03 Aug 2020 | Premiered: 03 Aug 2020

Akamai Technologies

Credential Stuffing in the Media Industry
sponsored by Akamai Technologies
RESEARCH CONTENT: This report features two years of insights into how criminals target and attack fast-growing industries, and supplements it with data that shows how they pivot and scale when circumstances change. Download it now.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Akamai Technologies

Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Protect Your Data from Ransomware with Commvault and Cloudian
sponsored by Cloudian
DATA SHEET: With Cloudian HyperStore enterprise storage combined with Commvault Complete Backup & Recovery software, the duo provides organizations with seamless ransomware protection at 70% less cost. Check out this data sheet to learn 7 key benefits that distinguish Cloudian & Commvault from other backup and recovery options.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Cloudian

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 07 Jul 2020 | Published: 08 Jul 2020

ComputerWeekly.com

Keeping Up with the Performance Demands of Encrypted Web Traffic
sponsored by Fortinet, Inc.
RESOURCE: Encryption has become a key element in the security of sensitive and confidential data in motion. However, it’s recently been discovered that cybercriminals are using encryption to deliver malware or exfiltrate stolen data. The following article overviews this growing risk and offers insight into how to identify and isolate malicious activity.
Posted: 18 Aug 2020 | Published: 04 Aug 2020

Fortinet, Inc.

e-book: Remote Workforce Security
sponsored by Dtex
EBOOK: Did you know that there’s a 78% increase in accidental data loss when employees work from home? Tap into this e-book to reveal more statistics like this and 3 ways your company can stay protected during this WFH era.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Dtex

Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

Your Guide to COVID-19-Related Threats
sponsored by TechTarget
RESOURCE: Amid the existing uncertainty of the current pandemic, it's unfortunate – but not surprising – to see an increase in cyberattack campaigns using the coronavirus as an entry point. This expert guide, The Cybersecurity Professional's Guide to Pandemic-Related Threats, explores the various threats to watch out for and highlights
Posted: 05 Aug 2020 | Published: 05 Aug 2020

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info