IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 246 Matches Previous Page  |  Next Page
Threat Intelligence Report
sponsored by F5 Networks
RESOURCE: How do you safeguard your employees from becoming phishing bait? In this report, learn why phishing campaigns work so well, how unsuspecting users play into the hands of attackers, and what your organization can do to avoid them.
Posted: 30 Nov 2018 | Published: 31 Dec 2017

F5 Networks

Digital Risk Protection: Understanding Digital Risk
sponsored by Proofpoint, Inc.
RESOURCE: Understand how you can protect your brand and customers from social media, mobile app, and domain threats.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Proofpoint, Inc.

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Dell SecureWorks

HP Secure Print Analysis: Are your Printers Easy Prey?
sponsored by HP
RESOURCE: How secure are your printers? Get your rating and a personalized checklist.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Analytics to Fight Tax Fraud
sponsored by SAS
WHITE PAPER: Fraudsters are becoming more and more sophisticated with their cyberattacks, especially when it comes to tax fraud. Download this white paper to explore how machine learning and analytics can help tax agencies fight cybercrime.
Posted: 16 Nov 2018 | Published: 31 Mar 2018

SAS

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Single Sign-On for Cloud and On Premise Apps
sponsored by Radware
VIDEO: In this webinar, explore Single Sign-On (SSO), see how your enterprise may benefit from implementing this technology, and how Multi-factor authentication (MFA) fits in.
Posted: 07 Nov 2018 | Premiered: 12 Apr 2018

Radware

Hidden Face of the Darknet
sponsored by Radware
VIDEO: Tune in to explore the different attack services and tools that can be purchased inside the dark net.
Posted: 06 Nov 2018 | Premiered: 31 Oct 2018

Radware

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

AlienVault

What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO: According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Memcached Reflection Attacks
sponsored by IBM Akamai
RESEARCH CONTENT: In early 2018, the DDoS attack size doubled after attackers discovered and employed a new, massive DDoS reflection and amplification method. In this resource, discover an approach to help you protect and prepare for any of these future web & DDoS attacks.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

IBM Akamai

Ransomware: Four Ways to Protect Data Now
sponsored by Citrix
RESOURCE: Discover 4 ways you can protect your data from ransomware.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

Citrix

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Top 10 Cloud Security Challenges
sponsored by Rackspace
WHITE PAPER: Cloud security is at the forefront of business agendas. Evolving security threats, new hacker methodologies, skills shortages and more are top-of-mind issues for CIOs. Download this resource today to discover 10 common concerns felt by CIOs and how you can approach and neutralize each.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Rackspace

Fileless Attacks
sponsored by Bitdefender
RESOURCE: Cybercriminals don't have to use malware files anymore to achieve a successful data breach or attack. Fileless or zero-footprint attacks are growing in popularity, today. Why? Read on to find out.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Bitdefender

Black Hat 2018 Hacker Survey Report
sponsored by Thycotic
RESEARCH CONTENT: Discover the hacker perspective on vulnerabilities and attack vectors they find easiest to exploit and better understand how to protect your organization.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

Thycotic

Cybercrime's Most Wanted: Guide to Protection
sponsored by Juniper Networks
RESOURCE CENTER: Find a lineup of today's most wanted cybercriminals, as well as an action plan to help you protect yourself, your data, your reputation, and your enterprise. Read on to find out the details.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

3 Components of an Effective Anti-Phishing Strategy
sponsored by Rapid7
RESOURCE: According to the 2018 Verizon Data Breach Investigations Report, phishing attacks are the number one threat to businesses today as email and social engineering are the most common methods of attack. Read on to learn how a comprehensive anti-phishing program can be built with just 3 foundational elements.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Rapid7

It's Time to Make Security Integral to Your Business
sponsored by British Telecommunications PLC
RESOURCE: No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

British Telecommunications PLC

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Advanced Bot Management
sponsored by Oracle Dyn
RESOURCE CENTER: Download this custom article to learn about an advanced bot manager that will help prevent your organization from falling victim to the bot epidemic.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Cyber Resilience for Email: Solution Brief
sponsored by Mimecast
EBRIEF: Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast
1 - 25 of 246 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement