IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
51 - 75 of 225 Matches Previous Page  |  Next Page
Rethinking the Cyber Security of Consumer Internet of Things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The current widespread use of poorly secured consumer IoT products has been causing menace to the security of the internet. The underlying knowledge and technology that are necessary to design and implement secure IoT products are already well-known and widely available. This article explores these more plausible solutions.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

ComputerWeekly.com

Computer Weekly – 9 April 2019: Using data science at Sainsbury's
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to retailer Sainsbury's about its data science strategy and how it helps the firm better understand customers. We take a detailed look at the evolution of the business intelligence market. And we find out how simulated disaster management can tackle the security skills gap. Read the issue now.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

ComputerWeekly.com

Endpoint Detection and Response
sponsored by CrowdStrike
RESEARCH CONTENT: This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.
Posted: 27 Mar 2019 | Published: 05 Jul 2018

CrowdStrike

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER: How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

HackerOne

CW Benelux ezine February 2019
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

ComputerWeekly.com

Top 10 cyber crime stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018
Posted: 03 Jan 2019 | Published: 03 Jan 2019

ComputerWeekly.com

Protect Your Online Business From Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

Akamai Technologies

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Dell SecureWorks

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

It's Time to Make Security Integral to Your Business
sponsored by BT
RESOURCE: No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

BT

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Using Splunk to Develop an Incident Response Plan
sponsored by Splunk
WHITE PAPER: Discover ways to help your organization prioritize threats and breaches and how machine data can help detect those breaches.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Splunk

Cisco Umbrella Case Study: How Leading Digital Innovator Avanade Protects Consultants and Clients
sponsored by Cisco Umbrella
CASE STUDY: Avanade, a leading digital innovator, had a goal of keeping its consultants secure no matter where their work took them. In this case study, find out how Avanade was able to use Cisco Umbrella to do so.
Posted: 24 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

2018 Cisco Annual Cybersecurity Report
sponsored by Cisco Umbrella
ANALYST REPORT: What if defenders could see the future? If they knew an attack was coming, they could stop it, or mitigate its impact and help ensure what they need to protect is safe. The fact is defenders can see what's on the horizon. Download this report so you can better equip your organization for a cyberattack before it comes.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Cisco Umbrella

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

CW ANZ: Fix the weak links
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

ComputerWeekly.com

Explore the Threat Hunting Process
sponsored by SearchSecurity.com
EZINE: The threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

SearchSecurity.com

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

Cryptojacking Emerging as a New Threat to Healthcare
sponsored by Cisco Umbrella
EGUIDE: With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.
Posted: 27 Aug 2018 | Published: 31 Jul 2018

Cisco Umbrella

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella
51 - 75 of 225 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement