Blended Threats Reports

Agile software testing pioneer slams the door on C-level email attacks
sponsored by Barracuda
WHITE PAPER: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 08 Feb 2021 | Published: 07 Jun 2019

Barracuda

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 08 Feb 2021 | Published: 01 May 2020

Barracuda

Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 07 Jul 2020 | Published: 08 Jul 2020

TechTarget ComputerWeekly.com

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE: As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016

Lookout

Resource Center: How to Safeguard Data
sponsored by McAfee, Inc.
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

McAfee, Inc.