IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
51 - 75 of 214 Matches Previous Page  |  Next Page
False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

BLUEPRINT: MODERN LAYERED SECURITY
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
Posted: 26 May 2020 | Published: 26 May 2020

ComputerWeekly.com

RANSOMWARE REALITIES FOR SMALL AND MEDIUM-SIZED BUSINESSES
sponsored by Crowdstrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

Crowdstrike

THE EVOLUTION OF RANSOMWARE: HOW TO PROTECT ORGANIZATIONS FROM NEW TRENDS AND METHODS
sponsored by Crowdstrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

Crowdstrike

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Know Your Enemy. Know Your Risk.
sponsored by eSentire
WHITE PAPER: This report gets inside the mind of a hacker, analyzing their motivations for penetrating cyber defenses, their methods and the most effective ways to reduce your risk. Learn why hackers attack sensitive data today (hint: it’s not always for the money).
Posted: 22 Apr 2020 | Published: 22 Apr 2020

eSentire

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

MSPs transform their endpoint security
sponsored by Malwarebytes
CASE STUDY: In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Malwarebytes

Ultimate Guide to Incident Response and Management
sponsored by TechTarget
RESOURCE: To avoid the increasingly detrimental consequences of a successful cyberattack, organizations are realizing the importance of incident response (IR) planning. So, how does your team plan to address potential vulnerabilities? Let us know & receive exclusive access to our guide, the Ultimate Guide to Incident Response and Management.
Posted: 24 Mar 2020 | Published: 10 Sep 2020

TechTarget

Top 9 DDOS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners, and crypto exchange phishing. Is your environment safe? View this webcast to learn everything you need to know about cryptocurrency, cryptojacking, and how you can protect yourself.
Posted: 10 Mar 2020 | Premiered: Mar 10, 2020

Cisco Umbrella

Insider Threat and Supply Chain Risk Reduction – in Real-Time
sponsored by Ionic Security
RESOURCE: Today’s organizations face a vast array of security threats, the 2 most prevalent being insider breaches and third-party attacks. In this blog post, the VP of Risk & Corporate Security at Ionic shares his guidance on how to best identify and mitigate these threats.
Posted: 25 Feb 2020 | Published: 03 Jan 2020

Ionic Security

NEW for 2020: Ransomware Defense For Dummies - 2nd Edition
sponsored by Cisco Umbrella
EBOOK: The 2nd edition of Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce risks.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Threats - Abracadabra of Malwares: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella

CIO Trends #10: Nordics
sponsored by ComputerWeekly.com
EGUIDE: Swedish people are pioneering when it comes to adopting the latest technologies. But this malleability to new tech has its limits. Read in this eguide how Swedish consumers are losing confidence in social media, with increasing distrust over personal data use and online privacy.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

CIO Trends #10: Benelux
sponsored by ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

Top APAC security predictions for 2020
sponsored by ComputerWeekly.com
EGUIDE: Cyber security remains a hot topic across Asia-Pacific, a region plagued by cyber attacks that have grown in intensity over the past year. Here are some of the security threats that enterprises should keep an eye on in 2020.
Posted: 15 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

Top IT Predictions in APAC 2020
sponsored by ComputerWeekly.com
DATA SHEET: As the new decade dawns, we wanted to look ahead at the technologies likely to dominate the Asia-Pacific IT landscape in 2020.
Posted: 15 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

Top 10 ASEAN IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

CW Benelux August 2019: Dutch academic seeks the personality behind the cyber criminal
sponsored by ComputerWeekly.com
EZINE: There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
Posted: 22 Jul 2019 | Published: 08 Aug 2019

ComputerWeekly.com

Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE: Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella
51 - 75 of 214 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences