Software  >  

Malicious Code

RSS Feed   
Malicious Code Reports
 
Catch intruders in minutes, not months
sponsored by CI Security
PRODUCT OVERVIEW: As cyberattacks continue to increase in volume and complexity, organizations are turning to security service providers for managed detection and response (MDR) capabilities. This white paper highlights the key features of Critical Insight Managed Detection & Response (MDR) and provides a breakdown of use cases across several industries.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

CI Security

Cybersecurity in Healthcare
sponsored by Egress Software Technologies Inc
WEBCAST: Healthcare is one the most highly targeted industries by cybercriminals. In this Osterman Research webinar, hear about various different types of breaches in the healthcare industry, what the hackers’ incentive was, and how organizations can implement protections.
Posted: 08 Apr 2020 | Premiered: Apr 8, 2020

Egress Software Technologies Inc

Avoiding Top 3 Security Challenges of Digital Transformation
sponsored by Menlo Security
WEBCAST: In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.
Posted: 20 Mar 2020 | Premiered: Mar 20, 2020

Menlo Security

Protect Your Data From Ransomware with Veeam & Cloudian
sponsored by Cloudian
WEBCAST: Dig into this webcast to discover how ransomware works and how Veeam and Cloudian offer customers a way to lock down backup data so it cannot be changed or deleted by ransomware.
Posted: 18 Mar 2020 | Premiered: Feb 19, 2020

Cloudian

How to Protect Organizations from New Ransomware Trends & Methods
sponsored by CrowdStrike
WHITE PAPER: Each year, ransomware attacks grow increasingly frequent and successful – leading to more dollars lost. In fact, by 2021 global damages from ransomware is expected to reach $20 billion. In this white paper, you’ll discover a comprehensive overview of the evolution of ransomware, common trends and how to protect against it.
Posted: 19 May 2020 | Published: 19 May 2020

CrowdStrike

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Definitive Guide to Internet Isolation
sponsored by Menlo Security
EBOOK: In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Menlo Security

CyberArk Blueprint for Privileged Access Management Success
sponsored by Cyber-Ark Software
WHITE PAPER: In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info