Software  >  

Malicious Computer Code

RSS Feed   
Malicious Computer Code Reports
 
How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Market Guide for Mobile Threat Defense Solutions
sponsored by Lookout
WHITE PAPER: Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.
Posted: 16 Jan 2018 | Published: 22 Aug 2017

Lookout

How to Align with the NIST Cybersecurity Framework
sponsored by SecurityMatters
EBOOK: Many organizations are embracing the NIST Cybersecurity Framework to manage their cybersecurity risks. This e-book reveals how to align with the NIST Cybersecurity Framework, the 3 components of the framework and its benefits.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

SecurityMatters

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

The Benefits of Network Monitoring for Industrial Automation
sponsored by SecurityMatters
WHITE PAPER: Recently, there have been many cyberattacks occurring in the industrial automation world including the Mirai botnet, WannaCry, Non-Petya and more. This whitepaper reveals an approach to improving network security by assessing, detecting, responding, and preventing attacks.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

SecurityMatters

Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017

Commvault

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Your Report on the State of Ransomware for MSPs
sponsored by Datto, Inc.
RESEARCH CONTENT: Inside, hear what more than 1,700 service providers found to be major trends, targets, and impacts of ransomware attacks through early 2017, to help you better inform your backup and DR policies going forward.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Datto, Inc.

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Potentially Dangerous User Accounts Identitifed
sponsored by Janrain
RESOURCE: A company's brand can be severely damaged when fraudulent accounts are created on digital properties with spam, phishing, and program abuse. This data sheet provides insight into protecting your web applications from fraud and various other cyberattacks.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement