Software  >  

Malicious Software

RSS Feed   
Malicious Software Reports
 
Hospital Had Backups, Paid Ransom Anyway
sponsored by Cylance
CASE STUDY: Every enterprise with sensitive data can fall victim to a ransomware attack like SamSam. This case study explores how enterprises with sensitive or important data should make backups and address how they implement their remote desktop protocol (RDP). Read on to understand the value RDP has to offer when used correctly.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

TOPICS: 
Cylance

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

TOPICS: 
DomainTools

Cisco Umbrella Case Study: How Leading Digital Innovator Avanade Protects Consultants and Clients
sponsored by Cisco Umbrella
CASE STUDY: Avanade, a leading digital innovator, had a goal of keeping its consultants secure no matter where their work took them. In this case study, find out how Avanade was able to use Cisco Umbrella to do so.
Posted: 24 Aug 2018 | Published: 31 Dec 2017

TOPICS: 
Cisco Umbrella

Integrated Security Operations - The Difference between Knowing and Guessing
sponsored by ServiceNow
WEBCAST: Cyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.
Posted: 02 Feb 2018 | Premiered: Feb 2, 2018

TOPICS: 
ServiceNow

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

TOPICS: 
Druva Software

Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO: Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018

TOPICS: 
Cylance

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

TOPICS: 
Dell SecureWorks

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

TOPICS: 
AlienVault

Threat Landscape Assessment with David Balcar
sponsored by Fujifilm Recording Media USA, Inc.
VIDEO: Security Strategist David Balcar assesses the current threat landscape as it relates to corrupted backups, malware attacks, and security breaches. Tune in for Balcar's top 10 guiding principles on protecting data with proper backups and preparing for outside and insider threats.
Posted: 12 Feb 2019 | Premiered: 12 Feb 2019

TOPICS: 
Fujifilm Recording Media USA, Inc.

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

TOPICS: 
Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement