Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Datto’s State of the Channel Ransomware Report
sponsored by Datto, Inc.
EBOOK: This report provides unique visibility into the state of ransomware from the perspective of channel enterprises and their clients, including a detailed look at year-over-year trends, strains to be aware of, and—perhaps most importantly—BC/DR recommendations for ensuring continuity in the face of this growing threat.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

Datto, Inc.

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

Malware: The Ubiquitous Menace
sponsored by The Media Trust
WHITE PAPER: Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

The Media Trust

Web Security Datasheet
sponsored by Mimecast
DATA SHEET: Mimecast Web Security is integrated with Mimecast's Secure Email Gateway with Targeted Threat Protection, helping customers consolidate protection using a single, cloud-based service that protects against the two most dominant cyberattack vectors: email and the web. Download this datasheet to learn more about Mimecast's key capabilities.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Agile Software Testing Pioneer Slams the Door on C-level Email Attacks
sponsored by Barracuda
CASE STUDY: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Barracuda

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

The Future of Cybercrime and Security
sponsored by Webroot
ANALYST REPORT: In Juniper Research's The Future of Cybercrime & Security report, explore key takeaways and an overview of the network & endpoint cybersecurity competitive landscape.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

Security Hygiene Gets a Refresh in the Wake of Baltimore's Cyberattack
sponsored by RSA Conference
RESOURCE: Baltimore's ransomware incident not only caught government servers by surprise, but it also reminded the industry that cyberattacks can still occur when they're least expected. In this podcast transcript, learn about the Center for Internet Security's Top 20 Critical Security Controls, the importance of good cyber hygiene habits, and more.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

RSA Conference

The Threat of Online Skimming to Payment Security
sponsored by Tala Security
RESOURCE: The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.
Posted: 09 Aug 2019 | Published: 01 Aug 2019

Tala Security

Are You Getting Phishing Attacks in Outlook?
sponsored by Inky Technology
RESOURCE: IT security and infrastructure personnel are seeing a high volume of phishing attacks every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can help solve your phishing attack problem.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement