Software  >  

Malicious Logic

RSS Feed   
Malicious Logic Reports
 
How to Secure Your Devices with Microsoft 365 Business
sponsored by TechData - Microsoft
RESOURCE: Breached or corrupted devices account for roughly 60% of today’s cyberattacks. Although this statistic is alarming, it allows for a clear area for IT security teams to focus their efforts. In this infographic, look at the high-level benefits of Microsoft 365 Business and see how it can help your organization secure its devices.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

TechData - Microsoft

Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

Offensive vs Defensive Security: Finding Vulnerabilities Before Your Attackers Do
sponsored by ProAct
WHITE PAPER: In chess, building your strategy around defensive, reactive moves may work for a time – but will ultimately be unsuccessful against creative opponents. Cybersecurity strategies operate similarly. The ability to proactively move against cyberthreats in an offensive way is critical. Read on to learn more about offensive cybersecurity.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

ProAct

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

Endpoint Detection and Response (EDR) for Hybrid Deployments
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

VMware International Unlimited Company

2020 Cybersecurity Outlook Report
sponsored by VMware International Unlimited Company
WHITE PAPER: The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

CyberArk Blueprint for Privileged Access Management Success
sponsored by Cyber-Ark Software
WHITE PAPER: In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

CrowdStrike Services Cyber Front Lines Report
sponsored by CrowdStrike
RESEARCH CONTENT: This year’s CrowdStrike report contains observations from the front lines of incident response and proactive services in 2019. Their analysis and lessons learned will add value to your proactive security measures and situational awareness for the rest of 2020. Download the report to get started.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

CrowdStrike

A Silver Lining for Security: Cybercrime is on the Rise, but the Cloud Offers Protection
sponsored by HP
WHITE PAPER: Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.
Posted: 18 Mar 2020 | Published: 31 Dec 2019

HP

MITRE ATT&CK Workbook
sponsored by VMware International Unlimited Company
WHITE PAPER: The MITRE ATT&CK framework has had a clear objective since its inception: develop a knowledge base around known cyberthreats and tactics to help organizations stay prepared. This workbook is designed as a starting point for organizations interested in leveraging the MITRE ATT&CK framework to improve their security posture.
Posted: 06 May 2020 | Published: 14 Feb 2020

VMware International Unlimited Company
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info