Software  >  

Malicious Computer Code

RSS Feed   
Malicious Computer Code Reports
 
How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

Are Your Security Controls Yesterday's News?
sponsored by Cymulate
WHITE PAPER: To find potential threats, many organizations have resorted to testing their security controls using a handful of common, "modern" methods. However, there are often limits that make these tests less effective. In this white paper, learn how a true threat actor simulation can properly test your security controls.
Posted: 19 Jul 2019 | Published: 31 Jul 2019

Cymulate

5 Signs of Malicious Activity Your Organization May Be Overlooking
sponsored by Farsight Security
RESOURCE: If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Farsight Security

Why Your Company Needs Third-Party Security for Office 365
sponsored by Symantec
RESEARCH CONTENT: Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.
Posted: 24 Apr 2019 | Published: 28 Feb 2019

Symantec

Tape as an Airgap Against Ransomware
sponsored by Fujifilm Recording Media USA, Inc.
WEBCAST: Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Fujifilm Recording Media USA, Inc.

Business Endpoint Protection
sponsored by Webroot
EBOOK: Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

2019 Threat Report
sponsored by Blackberry Cylance
WHITE PAPER: In this 2019 Threat Report, discover the trends observed and the insights gained, and the threats Cylance's consulting team, research team, and customers encountered over the past year.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Blackberry Cylance

Security Orchestration and Automation Playbook
sponsored by Rapid7
WHITE PAPER: Discover how security orchestration and automation helps teams improve their security posture and create efficiency – without sacrificing control of important security and IT processes.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Rapid7

5 Ways Ransomware Attacks Backup Software
sponsored by Cohesity
RESOURCE: It's important to keep five critical considerations in mind when you're strategizing how best to prevent, detect, and rapidly respond to a ransomware attack on your backups. View them in this resource.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Cohesity

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement