IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 323 Matches Previous Page  |  Next Page
Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Webinar: How to Future-Proof the Cloud, from the POV of a CISO, CPO and Ethical Hackers
sponsored by Synack
WEBCAST: Join Synack as they share how organizations are rapidly deploying dynamic security testing to future proof the connected world from the perspective of a CISO, Synack's Chief Product Officer & Head of Engineering, and ethical hackers from the Synack Red Team (SRT).
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Synack

Secure Your Email by Moving it to O365 with Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Email-based cyberattacks are growing increasingly frequent and harder to detect. This webinar provides a closer look at 13 email threat types, the role of automation in incident response and how to improve email security by using Microsoft Office 365 and Barracuda.
Posted: 07 Jan 2021 | Premiered: 07 Jan 2021

Barracuda

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

How to Help Prevent Increasingly Rampant Brand Exploitation
sponsored by Mimecast
WHITE PAPER: A company's reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization's preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.
Posted: 05 Jan 2021 | Published: 20 Jul 2020

Mimecast

Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

10 Experts on Active Threat Management
sponsored by GoSecure
EBOOK: The number of pervasive cyberthreats is growing larger with each passing week, which can leave security professionals feeling overwhelmed. In this e-book, hear from 10 IT security experts, including directors and C-level executives, on active threat management and data protection, and learn how you can better predict, prevent and detect attacks.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

GoSecure

A New Paradigm for Identity Assurance
sponsored by Arrow & RSA
WHITE PAPER: Today’s cyberthreats target either the users with access to critical data, or the data itself – and traditional security approaches are no longer viable against these attacks. The following whitepaper explores how identity assurance is changing, the role of authentication, and how to better protect your users and data – read on to get started.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Arrow & RSA

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Remote Agent Playbook
sponsored by RingCentral
WHITE PAPER: Transitioning to remote work has presented a lot of challenges for contact centers. Download this playbook to learn what strategies and tools you can implement today in your contact center to better support agents and customers during emergency situations.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

RingCentral

5 Best Practices To Secure Remote Workers
sponsored by Microsoft
RESOURCE: COVID-19 has dramatically changed the dynamics and landscape of remote work for the foreseeable future. So, what are the best practices for securing remote work? Read on to unlock 5 that will make your organizations and workers more secure and more productive.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Microsoft

Protect Sensitive Information by Deterring Print & Screen Capture Behaviors
sponsored by Fasoo
PRESENTATION: While more than half of organizations have experienced a print-related data breach, less than a quarter have made strides to implement secure printing initiatives. Read this report to learn more about print-related risks that lead to data breaches and how to protect your organization against these growing threats.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Fasoo

Driving Real Behavior Change
sponsored by Proofpoint
EBOOK: Because today’s cyberattacks often target an organization’s users, a people-centric approach gives your security team the best chance at identifying and preventing potential threats. Read this e-book to discover how to build an effective security awareness training program.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Proofpoint

Cyberattack Survival Kit
sponsored by Zerto
EGUIDE: Given the inevitability of ransomware attacks, organizations can no longer rely on cybersecurity measures to prevent attacks – modern approaches need to account for this eventuality and focus efforts on recovery, remediation and resilience. Read this Cyberattack Survival Guide to unlock a 6-step ransomware recovery strategy.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Zerto

Ransomware Playbook
sponsored by AWS Rapid7
EBOOK: Victims of ransomware attacks suffer the impact of productivity and revenue loss due to work stoppage. Plus, these businesses are likely to have to manage communications with the press, customers, prospects and vendors. It’s time to start taking action and lower your ransomware risk. This e-book provides ample first steps.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

AWS Rapid7

Microsoft Teams: Top 10 Security Threats
sponsored by McAfee
WHITE PAPER: The rapid move towards cloud capabilities and remote worker enablement has led to a massive increase in cloud collaboration tools, like Microsoft Teams. Read this white paper and discover the top 10 Microsoft Teams security threats.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

McAfee

Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

Atakama’s File Encryption Will Prevent Ransomware Exfiltration Threats
sponsored by Atakama
RESOURCE: Ransomware attacks have escalated in recent years to include newer, more devious techniques, like file exfiltration. This article looks at why ransomware is escalating and offers best practices for protecting your organizations from these attacks – read on to get started.
Posted: 09 Dec 2020 | Published: 16 Jun 2020

Atakama

Turkish Airlines Takes Security To New Heights With Cisco AMP & Umbrella
sponsored by Cisco Systems, Inc.
CASE STUDY: In this case study, follow Turkish Airlines as they partner with Cisco in order to establish effective threat hunting and incident response capabilities to better protect their data and customers against advanced malware threats, like ransomware.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Cisco Systems, Inc.

Onfido’s Identity Fraud Report 2020
sponsored by Onfido
RESEARCH CONTENT: Each year, fraudsters find new and more effective ways to benefit from cyberthreats – the pandemic of 2020 made it an especially profitable year for fraudsters. Read this identity fraud research report to learn more about the emerging threat types and most effective security techniques.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk
1 - 25 of 323 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info