IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 339 Matches Previous Page  |  Next Page
IT Ops & Security need to join forces
sponsored by Matrix42
WHITE PAPER: In this white paper, take a closer look at the security challenges for security leaders, the burden of GDPR, and discover a checklist for developing an effective security strategy that automates and integrates workspace management with data loss prevention, threat prevention, data encryption, post-infection protection and compliance.
Posted: 27 May 2020 | Published: 27 May 2020

Matrix42

Get Off the Ice Before it Breaks
sponsored by Matrix42
PRODUCT OVERVIEW: Each year, cyberattacks grow in both volume and success, leading to costly breaches. In fact, 7 in 10 industrial organizations fell victim to a cyberattack over the last 2 years. In this solution brief, learn more about Matrix42’s GDPR-compliant data protection offering, which may be able to help your organization meet its security goals.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

Threats Using Coronavirus as Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 26 May 2020 | Published: 26 May 2020

ComputerWeekly.com

FilelessThreats 101
sponsored by Trend Micro
RESOURCE: This infographic provides a high-level overview of fileless threats: What they are, how they operate, where the vulnerabilities lie and how to protect against them. Read on to equip yourself with the knowledge to identify and prevent fileless attacks.
Posted: 21 May 2020 | Published: 21 May 2020

Trend Micro

Ransomware Realities for Small and Medium-Sized Businesses
sponsored by CrowdStrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

CrowdStrike

How to Protect Organizations from New Ransomware Trends & Methods
sponsored by CrowdStrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

CrowdStrike

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Cognitions of a Cybercriminal
sponsored by VMware International Unlimited Company
WHITE PAPER: Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.
Posted: 15 May 2020 | Published: 31 Jul 2019

VMware International Unlimited Company

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

The Big Easy - 3 steps for better security
sponsored by Cisco Umbrella
VIDEO: In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.
Posted: 15 May 2020 | Premiered: 11 Dec 2019

Cisco Umbrella

The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making
sponsored by Vulcan
WHITE PAPER: Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.
Posted: 14 May 2020 | Published: 14 May 2020

Vulcan

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

2020 Cyberthreat Defense Report
sponsored by Gigamon
WHITE PAPER: The CyberEdge Group’s annual Cyberthreat Defense Report provides an insider look at the diverse threats plaguing organizations and the strategic approaches IT and security teams are taking to mitigate these threats. A snapshot of the key findings from this year’s report can be found in the following executive brief.
Posted: 14 May 2020 | Published: 14 May 2020

Gigamon

The Economics of Cybersecurity: Preparing for Ransomware
sponsored by BlueVoyant
EBOOK: One of the most recent evolutions of malware is ransomware, and it’s not going anywhere. In fact, it’s grown to the point where businesses need to consider it an inevitability and prepare accordingly. This e-book is designed to help you identify the cybersecurity costs needed for building a proactive defense strategy. Read on to learn more.
Posted: 12 May 2020 | Published: 12 May 2020

BlueVoyant

Proactive Incident Detection, Alerting, Remediation and Service Improvement
sponsored by Cloud4C
BROCHURE: Today’s cyberattacks not only cause disruptions that cost money but have reputational implications as well. This brochure highlights some of the key features of Azure Sentinel, a tool that combines the features of SOAR and SIEM to help your organization modernize its security operations center and stay ahead of threats.
Posted: 11 May 2020 | Published: 11 May 2020

Cloud4C

Trends & Future Outlook
sponsored by BlueVoyant
EBOOK: Ransomware is one of the costliest and disruptive cyberattacks plaguing organizations, and each year the list of victims grows. In this e-book, take a closer look at the current and emerging ransomware trends including how victims are targeted and proactive measures that can be taken to prevent future attack. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

The Imitation Game Detecting and Thwarting Automated Bot Attacks
sponsored by F5 Networks
WHITE PAPER: Bot attacks pose a critical threat to today’s organizations, and traditional security methods are unfit to keep pace with security demands. The following research report contains a summary of findings from a recent study conducted by EMA. The study was designed to better understand this threat and how to prevent it. Read on to unlock the results.
Posted: 08 May 2020 | Published: 29 Feb 2020

F5 Networks

How to Combat Island Hopping
sponsored by VMware International Unlimited Company
WHITE PAPER: Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.
Posted: 08 May 2020 | Published: 08 May 2020

VMware International Unlimited Company

Cloud4C: Managed Security Services
sponsored by Cloud4C
BROCHURE: Managed security service providers are a critical partner for organizations seeking guidance through the threat or incident lifecycle. This brochure provides a snapshot of the key features and capabilities of Cloud4C, a managed security service provider whose goal is to partner with organizations to operationalize threat data and ensure security.
Posted: 07 May 2020 | Published: 07 May 2020

Cloud4C

Building a High-Speed SOC
sponsored by VMware International Unlimited Company
WHITE PAPER: 87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.
Posted: 07 May 2020 | Published: 07 May 2020

VMware International Unlimited Company

How to Build A World-Class Cybersecurity Practice
sponsored by BlueVoyant
EBOOK: Cybersecurity is a constant chess match between organizations and criminals. As adversary tactics evolve, so too should the methods of the organization. This e-book offers the expertise of five BlueVoyant cybersecurity leaders with regards to today’s risks, which tools to use, and tips for building your security system. Read on to get started.
Posted: 07 May 2020 | Published: 07 May 2020

BlueVoyant

YARA-L: A New Detection Language for Modern Threats
sponsored by Chronicle
WHITE PAPER: When it comes to threat detection and incident investigation, most organizations turn to SIEM, SOAR or another similar approach for analyzing security data. However, analyzing data is made more challenging by the increasing amount being generated. In this white paper, learn more about YARA-L, a new detection language for analyzing threat data.
Posted: 07 May 2020 | Published: 07 May 2020

Chronicle

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

A Virtual, Vigilant Watcher
sponsored by Cloud4C
PRODUCT OVERVIEW: In this white paper, discover the highlights of a workshop aimed at enhancing user awareness and understanding of Azure Sentinel, a cloud-native SIEM and SOAR tool by Microsoft, designed to support organizations with threat detection and response for the risks specific to their network, infrastructure and data. Read on to learn more.
Posted: 06 May 2020 | Published: 06 May 2020

Cloud4C
1 - 25 of 339 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info