IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
1 - 25 of 267 Matches Previous Page  |  Next Page
Crowdstrike Video 1
sponsored by CrowdStrike
WEBCAST: What did cybercriminals get up to last year? How did they exploit the global health crisis to become more dangerous than ever? View this webinar detailing CrowdStrike’s 2021 Global Threat Report, which uncovers trends in attackers’ ever-evolving tactics, techniques and procedures observed by CrowdStrike teams in 2020.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

CrowdStrike

The Hidden Costs Of Cybercrime
sponsored by McAfee
ANALYST REPORT: $945 billion is the estimated monetary loss from cybercrime. This is a significant figure – but when you take a closer look, you’ll see that when it comes to organizational stability, efficiency, brand damage and trust, the cost of cybercrime goes far beyond what’s taken by criminals. View this report to learn the hidden costs of cybercrime.
Posted: 09 Apr 2021 | Published: 31 Dec 2020

McAfee

2021 Global Threat Report
sponsored by CrowdStrike
WEBCAST: What did cybercriminals get up to last year? View this webinar detailing CrowdStrike’s 2021 Global Threat Report, which uncovers trends in attackers’ ever-evolving tactics, techniques and procedures observed by CrowdStrike teams in 2020.
Posted: 06 Apr 2021 | Premiered: Feb 25, 2021

CrowdStrike

UNDERSTANDING THE ECONOMICS BEHIND CYBER ATTACKS— WHAT MAKES YOUR COMPANY A PRIME TARGET?
sponsored by F5 Networks
EBOOK: Automated attacks are proliferating against organizations around the globe. As the cost and investment of launching these attacks continues to plummet, companies are increasingly experiencing credential stuffing attacks that can lead to account takeover and fraud. View this e-book to learn how hacker finance leads to attacks.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Hackers
F5 Networks

2020 Security Operations Annual Report
sponsored by Arctic Wolf Networks, Inc.
ANALYST REPORT: As the world scrambled to become remote, the complexion of security operations, or SecOps, changed dramatically. Read Arctic Wolf’s Security Operations Report to learn the numbers behind these security changes and how to advance your own SecOps capabilities.
Posted: 01 Apr 2021 | Published: 30 Oct 2020

Arctic Wolf Networks, Inc.

Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
Posted: 01 Apr 2021 | Published: 07 Apr 2021

ComputerWeekly.com

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 25 Mar 2021 | Published: 19 Jun 2020

TechTarget

Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity
sponsored by Dell SecureWorks
WEBCAST: The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.
Posted: 22 Mar 2021 | Premiered: Mar 22, 2021

Dell SecureWorks

Hacker Personas A Deeper Look Into Cybercrime– The Opportunist
sponsored by Webroot
RESOURCE: Every business is at risk of attack, and business leaders need to ensure that every employee is properly protected, both from a technology standpoint and through continued security awareness training. Download this PDF to learn more.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

TOPICS:  Hackers
Webroot

The Indelible Impact Of Covid-19 On Cybersecurity
sponsored by Bitdefender
ANALYST REPORT: In May 2020, right after the initial wave of the COVID-19 outbreak, a cybersecurity study was conducted among 6,724 IT and security workers across the US, Europe and ANZ. Download this study to get a look at how enterprises immediately reacted to COVID-19, and learn how their future security plans compared to what you’ve carried out.
Posted: 19 Mar 2021 | Published: 29 May 2020

Bitdefender

Threat Hunting With Securex
sponsored by Cisco Systems, Inc.
EBOOK: The world has been at least partially remote for almost a year now, and while security teams have taken bolder defensive measures, security that is merely reactive won’t be able to stop increasingly complex cyber threats. Dive into this interactive e-book to get a look at Cisco SecureX, which strives to disrupt attacks before they materialize.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cisco Systems, Inc.

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
sponsored by Gigamon
WHITE PAPER: Ransomware is a fast-growing threat affecting organizations of all sizes and industries. But a combination of security hygiene, prevention techniques and detection and response capabilities can combat ransomware successfully. Download this SANS white paper to identify what ransomware is, the threats it might pose and how to defend against it.
Posted: 18 Mar 2021 | Published: 30 Nov 2020

Gigamon

The 2020 Geography of Cryptocurrency Report
sponsored by Chainanalysis
ANALYST REPORT: In this report, take a look at an analysis of geographic trends in cryptocurrency adoption, usage and regulation. Understand why a lack of consistency makes crypto difficult to regulate (and therefore secure), and learn how ransomware is affecting the trade and share of cryptocurrency as well as which strains are most often used.
Posted: 11 Mar 2021 | Published: 30 Sep 2020

TOPICS:  Hackers | Malware
Chainanalysis

Traditional AV is Failing: What You Need to Protect Your Organization
sponsored by VMware
WEBCAST: In our current work-from-home environment, there’s just no way for traditional antivirus (AV) products to keep pace with the latest advanced attacks. Access this webinar to learn how these threats are breaching your environment, and how VMware’s Carbon Black Cloud strives to detect and prevent these attacks from wreaking havoc.
Posted: 11 Mar 2021 | Premiered: Mar 11, 2021

VMware

Turning Knowledge into Power
sponsored by Trend Micro
EBOOK: Organizations are working to defend against the volume of evolving cyberthreats plaguing them every day. One critical way to do so is through reading in-depth research that provides access to the methods and means of cybercriminals. Dive into this e-book learn about the 8 critical areas of cybersecurity and threat research.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Best Practices DNS: The First Principle of Enterprise Security
sponsored by Infoblox
WHITE PAPER: For today’s WFH and soon-to-be-hybrid workforces, security teams must exploit DNS. As the foundation of enterprise networks, DNS can provide a layer of security intelligence otherwise not seen by security operations centers. Leverage this report to learn 5 critical questions organizations must ask of DNS security vendors.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Infoblox

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

Integrated Cybersecurity Model for Your Work-From-Anywhere Environment
sponsored by NWN Corporation
WHITE PAPER: Cybercrime was lucrative across 2020 – the pandemic exposed several security gaps that hackers were eager to exploit. This white paper highlights how the Integrated Cybersecurity Model can help protect remote workforces from today’s evolving cyberthreats – read on to learn more.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

NWN Corporation

2020 Enterprise Cloud Incident Response Survey
sponsored by Infoblox
RESEARCH CONTENT: In this year’s SANS Enterprise Cloud Incident Response (IR) Survey, discover the key challenges that today’s IT and security leaders are facing as it relates to addressing cloud-related threats – which range from external risks like data theft to internal dangers like staffing shortages. Download the report now to get started.
Posted: 16 Feb 2021 | Published: 30 Sep 2020

Infoblox

2020 Remote Workforce Security Report
sponsored by Okta
RESEARCH CONTENT: Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Simulating The Latest Threats and Techniques with The MITRE ATT&CK Matrix
sponsored by Cymulate
EBOOK: Organizations that don’t actively simulated advanced persistent threats (APTs) take a serious gamble each time they are faced with a serious cyberthreat. The MITRE ATT&CK Matrix aims to provide you with the knowledge and tactics needed to understand, simulate and prepare for today’s APTs – read this e-book to learn more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Cymulate

Hacker's Path To The Crown Jewels
sponsored by Cymulate
EBOOK: Hacking campaigns typically follow a predictable pattern involving 4 main activities: Recon, initial foothold, lateral movement, and data exfiltration. Download this e-book to learn more about this 4-step hacking pattern and discover how organizations can better detect the early warning signs of an impending hack.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Cymulate

Cybersecurity Challenges In Financial Services – Market Survey Report
sponsored by Clearswift
RESEARCH CONTENT: According to a Clearswift market survey report into the financial services industry, the COVID-19 pandemic has had a profound impact on security, compliance and strategic initiatives. Read this report to learn more about the specific challenges, cyberthreats and obstacles facing CIOs, CISOs and other security leaders in the financial sector.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Clearswift

Computer Weekly - 9 February 2021: Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason
1 - 25 of 267 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences