Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

TOPICS: 
Cisco Umbrella

Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Trend Micro, Inc.

Solution Overview: Iron Cloud Critical Protection and Recovery
sponsored by Iron Mountain
PRODUCT OVERVIEW: This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

TOPICS: 
Iron Mountain

The Medical Device Paradox: Hospital Systems Race Against Time to Close the Patient Safety Cyber Gap
sponsored by Cylance
WHITE PAPER: In this white paper, learn about the growing paradox of medical device efficacy and the trends in medical device vulnerability and cybersecurity. Find out why your hospital system needs to consider an endpoint protection platform to proactively prevent the execution of advanced persistent threats and malware.
Posted: 03 Oct 2018 | Published: 31 Dec 2017

TOPICS: 
Cylance

Ransomware Defense For Dummies
sponsored by Cisco Umbrella
EBOOK: Take a look at this Ransomware Defense for Dummies e-book for 5 short chapters that explore how ransomware operates and its defining characteristics, security best practices to reduce ransomware, and more.
Posted: 29 Aug 2018 | Published: 31 Dec 2017

TOPICS: 
Cisco Umbrella

Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO: Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018

TOPICS: 
Cylance

DIY is DOA: Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Dell SecureWorks

Symantec Secures Rockwell Automation Industrial Control and Business Intelligence Solutions
sponsored by Symantec
CASE STUDY: Industrial control systems have become a major focus for attacks and are now among the top targeted sectors. To help address the risk to computer-based endpoints in automation systems, Rockwell Automation partnered with Symantec Corporation to provide endpoint level security. Download this case study to learn more about the partnership.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

TOPICS: 
One Identity

How Ransomware Attacks have Changed
sponsored by CyberArk Software, Inc
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

TOPICS: 
CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement