Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
Protect Hybrid Workloads from Cyberattack: Advance to Secure Servers
sponsored by Logicalis
WHITE PAPER: Download this white paper to learn about an approach to protecting hybrid workloads from cyberattacks that utilizes a server specifically designed to protect against malicious threats that target firmware.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Logicalis

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella

How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

AlienVault

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

AlienVault

Report: Securing the Enterprise Against Cyberattacks
sponsored by Akamai Technologies
ANALYST REPORT: 71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.
Posted: 03 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

2018 Global Threat Intelligence Report Executive Guide
sponsored by Cisco & Dimension Data
RESEARCH CONTENT: Explore this 22-page Global Threat Intelligence Report to uncover findings that will help you make investment decisions aligned with your industry sector, geographic profile, and risk appetite.
Posted: 22 May 2018 | Published: 22 May 2018

Cisco & Dimension Data

Your People are Your Biggest IT Security Threat
sponsored by Rackspace Microsoft
WHITE PAPER: Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement