Software  >  

Malicious Computer Code

RSS Feed   
Malicious Computer Code Reports
 
How to Detect Cryptomining in your Environment with AlienVault
sponsored by AlienVault
VIDEO: In this webcast, learn the what, why and how of cryptomining and how AlienVault Unified Security Management (USM) can help you detect this malicious activity.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

TOPICS: 
AlienVault

Quadrupling Backup Speed and Blocking Ransomware with Cloud Backup
sponsored by Acronis
CASE STUDY: Read this case study to learn why this electric company turned to the cloud when looking for a backup system to protect them from future ransomware attacks.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

TOPICS: 
Acronis

SE Labs Predictive Malware Response Test
sponsored by Cylance
ANALYST REPORT: Uncover findings from SE Labs predictive malware response testing, and learn how an AI technology at the heart of an endpoint protection platform can keep your organization safe from zero-day attacks.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

TOPICS: 
Cylance

Only You Can Prevent Ransomware, Instead of Falling Victim to It
sponsored by Cylance
WHITE PAPER: This white paper can help enterprises better understand the current threat landscape and how to stay protected against growing ransomware attacks.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

TOPICS: 
Cylance

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

TOPICS: 
Versa Networks

How Italy's Largest Service Provider Leverages Security
sponsored by Cisco Umbrella
CASE STUDY: In this case study, find out how Telecom Italia (TIM) was able to keep more than half a million business customers safe, while having a competitive advantage and an incremental revenue opportunity in the process.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

TOPICS: 
Cisco Umbrella

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

TOPICS: 
Akamai Technologies

How Hospitals Can Combat Ransomware Attacks
sponsored by Cisco Umbrella
EGUIDE: Learn what separated WannaCry from other ransomware attacks, as well as what hospitals can and should be doing to combat future ransomware attacks.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

TOPICS: 
Cisco Umbrella

Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE: Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

TOPICS: 
ConvergeOne

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

TOPICS: 
Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement