IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 181 Matches Previous Page  |  Next Page
Rethinking the Cyber Security of Consumer Internet of Things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

ComputerWeekly.com

Computer Weekly – 9 April 2019: Using data science at Sainsbury's
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

Detect and Prevent Fraud Before Claims are Paid
sponsored by SAS
WHITE PAPER: Fraud losses represent an increasingly complex and systemic risk that's affecting the profitability of every insurance company. In this white paper, learn how SAS takes an enterprise approach to fraud detection and prevention by delivering software either on-site or via the cloud.
Posted: 27 Mar 2019 | Published: 30 Sep 2018

SAS

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Cryptojacking
sponsored by Symantec
WEBCAST: Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.
Posted: 06 Mar 2019 | Premiered: Mar 6, 2019

Symantec

Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER: How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

HackerOne

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Dell SecureWorks

CW Benelux ezine February 2019
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

ComputerWeekly.com

Top 10 cyber crime stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
Posted: 03 Jan 2019 | Published: 03 Jan 2019

ComputerWeekly.com

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

It's Time to Make Security Integral to Your Business
sponsored by BT
RESOURCE: No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

BT

Ransomware Defense For Dummies
sponsored by Cisco Umbrella
EBOOK: Take a look at this Ransomware Defense for Dummies e-book for 5 short chapters that explore how ransomware operates and its defining characteristics, security best practices to reduce ransomware, and more.
Posted: 29 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Threat Monitoring, Detection and Response
sponsored by Alert Logic
RESEARCH CONTENT: Information security teams worldwide are increasingly concerned about the rapid growth of cyberthreats. To address this concern, a survey was conducted to explore the perspectives of cybersecurity professionals on several important threat lifecycle topics. Download this report for a comprehensive snapshot into the key survey findings.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Alert Logic

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

InSecurity Podcast: Clint Watts on Social Media Manipulation
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by special guest Clint Watts, author and MSNBC national security contributor, as they discuss cyberattacks and hackers in the social media world.
Posted: 27 Aug 2018 | Premiered: Jun 18, 2018

Cylance

Cisco Umbrella Case Study: How Leading Digital Innovator Avanade Protects Consultants and Clients
sponsored by Cisco Umbrella
CASE STUDY: Avanade, a leading digital innovator, had a goal of keeping its consultants secure no matter where their work took them. In this case study, find out how Avanade was able to use Cisco Umbrella to do so.
Posted: 24 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by Katie Moussouris, CEO of Luta Security, to talk about bugs, bug bounties and their impact on security and privacy.
Posted: 24 Aug 2018 | Premiered: Aug 13, 2018

Cylance

2018 Cisco Annual Cybersecurity Report
sponsored by Cisco Umbrella
RESOURCE: What if defenders could see the future? If they knew an attack was coming, they could stop it, or mitigate its impact and help ensure what they need to protect is safe. The fact is defenders can see what's on the horizon. Download this report so you can better equip your organization for a cyberattack before it comes.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Cisco Umbrella

Cryptojacking Emerging as a New Threat to Healthcare
sponsored by Cisco Umbrella
EGUIDE: With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.
Posted: 27 Aug 2018 | Published: 31 Jul 2018

Cisco Umbrella

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella
1 - 25 of 181 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement