Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
Detect Ransomware Before it's Too Late with AlienVault USM Anywhere
sponsored by AlienVault
WEBCAST: Ransomware alone is the fastest growing security threat. Take a look at this webcast to uncover how to detect ransomware before it's too late with a unified security management (USM) strategy.
Posted: 17 Apr 2018 | Premiered: Apr 17, 2018

AlienVault

A New Approach to Defending your Network Against Ransomware
sponsored by Veeam Software
WHITE PAPER: In this white paper, learn how to a concerted backup and disaster recovery process helps in minimizing the damage of ransomware, and some tips on how you can get started.
Posted: 05 Apr 2018 | Published: 31 Mar 2018

Veeam Software

Royal Bank of Scotland Reduces Phishing Susceptibility by More Than 78%
sponsored by Wombat Security Technologies
CASE STUDY: Financial institutions are highly targeted by cybercriminals. Explore this case study to gain insight into how Royal Bank of Scotland overcame the increase of malware and phishing attacks targeting their organization.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Recover from Malware and Ransomware
sponsored by Citrix
WEBCAST: Cyberattacks, such as malware and ransomware, can cost millions in lost revenue and productivity. This webcast offers strategies for protecting against such attacks and securing access to desktops, applications, and data.
Posted: 01 Feb 2018 | Premiered: Feb 1, 2018

Citrix

Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE: Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

ConvergeOne

A Cornerstone for Ransomware Protection & Recovery is Understanding the Threat
sponsored by Carbonite
RESOURCE: In this guide, learn about the ransomware problem in greater detail, as well as some steps, strategies, and best practices to take in order to mitigate the damage of a ransomware attack
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Carbonite

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018

Semafone

How Continuous Data Protection can Improve Ransomware Recovery
sponsored by DataCore Software Corporation
RESOURCE: In this resource, learn why continuous data protection (CDP) might be the best way for you to make recovering from ransomware fast and effective.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

DataCore Software Corporation

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement