Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
10 Signs It's Time To Review Your Endpoint Protection
sponsored by Blackberry Cylance
RESOURCE: Cyber attacks are increasing in frequency, and effectiveness. The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended? In this infographic, explore 10 signs that will help you determine whether your endpoint security strategy needs to be updated.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Blackberry Cylance

Defend Yourself with Risk-Based Vulnerability Management
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Arctic Wolf Networks, Inc.

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

How to Survive Advanced Targeted Attacks
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019


Beyond The Phish: 2019 Report
sponsored by Proofpoint
WHITE PAPER: In Proofpoint's 2019 Beyond the Phish report, explore user knowledge of a broad range of best practices for cyberhygiene, security and compliance. The report analyses millions of responses gathered from their Security Education Platform.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Proofpoint

Endpoint Protection Buyers Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

Q2, 2019 Cyberthreats & Trends Report
sponsored by Neustar
ANALYST REPORT: While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.
Posted: 19 Aug 2019 | Published: 12 Aug 2019

Neustar

Best Practices to Prevent, Detect, and Respond to a Ransomware Attack
sponsored by Cohesity
EBOOK: This e-book offers instruction on preventing, detecting, and responding to a ransomware attack. Continue reading for 3 tips on how to prevent backup from becoming a target and guidance on formulating a multi-layered data protection approach.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Cohesity

Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement