Software  >  

Malicious Software

RSS Feed   
Malicious Software Reports
 
Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Improve Threat Resolution Cycles By Leveraging Dns
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Are You Ready For The Next Data Explosion?
sponsored by arcserve
RESOURCE: By 2021, it’s expected than any given organization will fall victim to a ransomware attack every 11 seconds – with global costs predicted to reach $20 billion. Why such a stark rise? Data generation is skyrocketing, and with more data comes more cybercrime. Read this infographic to learn more about the next data explosion.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE: Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Inky Technology

Spotlight on Current & Emerging Ransomware Threats
sponsored by TechTarget
RESOURCE: Check out our e-guide Spotlight on Current & Emerging Ransomware Threats to evaluate the current ransomware threat landscape. Highlights include a spotlight on how 3 ransomware strains could impact your company, 4 best practices for reporting attacks, and ransomware negotiations: An inside look at the process.
Posted: 29 May 2021 | Published: 28 Aug 2021

TechTarget

Get The Green Light For Ransomware Protection
sponsored by arcserve
RESOURCE: For security pros hoping to convince business decision-makers to invest in ransomware protection, it’s critical to ‘speak their language’ by highlighting the most impactful data (revenue, consumer behavior, actual costs, etc.). Read this infographic for 7 tips to help convey the seriousness of ransomware.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
sponsored by Gigamon
WHITE PAPER: Ransomware is a fast-growing threat affecting organizations of all sizes and industries. But a combination of security hygiene, prevention techniques and detection and response capabilities can combat ransomware successfully. Download this SANS white paper to identify what ransomware is, the threats it might pose and how to defend against it.
Posted: 18 Mar 2021 | Published: 30 Nov 2020

Gigamon

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Intelligent Ransomware Recovery with Wipro Enterprise VaultPowered by Cohesit
sponsored by Cohesity and Wipro
ESG: Implementing a good cyber recovery solution is becoming more important as cyber-criminals become increasingly sophisticated—targeting not only production data and applications, but also the backup data that organizations rely on to recover their environments from exactly such an event. Explore this ESG report to learn about one such solution.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TOPICS:  Malware
Cohesity and Wipro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences