Software  >  

Malicious Logic

RSS Feed   
Malicious Logic Reports
Royal Bank of Scotland Reduces Phishing Susceptibility by More Than 78%
sponsored by Wombat Security Technologies
CASE STUDY: Financial institutions are highly targeted by cybercriminals. Explore this case study to gain insight into how Royal Bank of Scotland overcame the increase of malware and phishing attacks targeting their organization.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

10 Key Tips for Securing DNS – A For Dummies Guide 2018
sponsored by Infoblox
EBOOK: Because the internet is constantly being attacked and hacked, enterprises must work to defend themselves. Take a look at this For Dummies e-book to learn how to optimize your security operations to protect users and data from malware as well as improve application and service availability.
Posted: 16 Mar 2018 | Published: 16 Mar 2018


The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

Threat Landscape Report
sponsored by Fortinet, Inc.
RESOURCE: According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

Fortinet, Inc.

The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: 95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

User Risk Report: Results of an International Cybersecurity Awareness Survey
sponsored by Wombat Security Technologies
RESEARCH CONTENT: It is no secret that cybersecurity and its role in data protection is front-page news on a regular basis. This report reveals personal habits of employees regarding data and network security and overall shows a need for improvement in these areas.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Stop Really Nasty Malware, Pre- and Post-Execution
sponsored by enSilo
WEBCAST: Sophisticated malware is the new weapon of choice for criminals. Tune into this webinar to hear from security expert, Dave Shackleford, as he reviews a security strategy aimed at responding and defending against advanced malware and ransomware threats.
Posted: 26 Feb 2018 | Premiered: Mar 22, 2018, 13:00 EDT (17:00 GMT)

10 Ways to Accelerate Time to Detection and Response
sponsored by McAfee, Inc.
WHITE PAPER: Malware dwell times a top concern for IT executives and practitioners at every level. This white paper shows you 10 ways to add speed and intelligence to your incident detection and response and regain time.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement