Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
Small Businesses Deserve Big Protection
sponsored by Cisco Umbrella
EBOOK: 66% of all small businesses have experienced a cyberattack. And now, the rise in SaaS apps and an increase in remote workers has forced these businesses to address their increasingly outdated infrastructure. How can your small business survive evolving threats? Take a look at this e-book to see where you can make a change.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Cisco Umbrella

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

Case Study: Lee Company
sponsored by Clearedin
CASE STUDY: In this case study, discover how Lee Company, a construction and building services firm, was able to improve their email, cloud and collaboration security capabilities through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

A New Paradigm for Identity Assurance
sponsored by Arrow & RSA
WHITE PAPER: Today’s cyberthreats target either the users with access to critical data, or the data itself – and traditional security approaches are no longer viable against these attacks. The following whitepaper explores how identity assurance is changing, the role of authentication, and how to better protect your users and data – read on to get started.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Arrow & RSA

The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE: It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

One of the U.K.’s Largest Public Healthcare Organizations Opts in for Cisco’s Integrated Security Approach
sponsored by Cisco Systems, Inc.
CASE STUDY: One of the largest public healthcare organizations in the UK had a few challenges to tangle with: Their traditional endpoint security was ineffective, they lacked the ability to proactively hunt for threats and they were concerned with patient data privacy. How did they overcome these challenges? This case study shows how Cisco was able to help.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Cisco Systems, Inc.

Cisco Cloud Mailbox Defense
sponsored by Cisco
DATA SHEET: As mailboxes move to the cloud, IT professionals are realizing that built-in email security will not be enough. Insider threats, account takeover and business email compromise loom larger than ever, and as such, it may be wise to consider supplementing your secure email gateway. See this data sheet to learn about Cisco Cloud Mailbox Defense.
Posted: 07 Oct 2020 | Published: 31 May 2020

Cisco

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info