Software  >  

Malicious Software

RSS Feed   
Malicious Software Reports
Proactive Incident Detection, Alerting, Remediation and Service Improvement
sponsored by Cloud4C
BROCHURE: Today’s cyberattacks not only cause disruptions that cost money but have reputational implications as well. This brochure highlights some of the key features of Azure Sentinel, a tool that combines the features of SOAR and SIEM to help your organization modernize its security operations center and stay ahead of threats.
Posted: 11 May 2020 | Published: 11 May 2020


Avoid Ransomware Disasters with a Better Backup and Recovery Strategy
sponsored by Rubrik
ANALYST REPORT: Download this Gartner report to learn how to avoid and prepare for ransomware attacks with a resilient backup strategy. Inside you’ll find 4 recommendations, must-have detection, backup, & recovery features, how to implement test plans and prep for critical app recovery, and more.
Posted: 04 May 2020 | Published: 22 Jul 2019


HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020


Payroll Fraud: When Direct Deposits Go Rogue
sponsored by Armorblox
WHITE PAPER: One thing all employees can agree on the sense of accomplishment that comes on salary day. Imagine the feeling of disappointment upon realizing that a cybercriminal diverted your wages to their own account. Payroll fraud is a growing problem. In this white paper, take a closer look at what defines payroll fraud and what makes it successful.
Posted: 13 Apr 2020 | Published: 13 Apr 2020


Endpoint Security Buyers Guide
sponsored by Trend Micro
WHITE PAPER: In this Endpoint Security Buyers Guide, learn about the benefits you should look for in a security solution, which can help you differentiate between the various threat detection, protection, and investigative capabilities currently flooding the market.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

Trend Micro

Cloudian Solutions for Ransomware
sponsored by Cloudian
DATA SHEET: With the WORM approach, once data is written, it cannot be changed or deleted until a certain amount of time has passed, and because the data cannot be modified, it cannot be encrypted, making malware ineffective. Check out this datasheet to learn the 3 ways that WORM-equipped storage can be deployed to protect your apps.
Posted: 19 Mar 2020 | Published: 19 Mar 2020


Abusing code signing for profit
sponsored by Chronicle
WHITE PAPER: Cryptographically signing a piece of code is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers. Download this white paper to see what Chronicle researchers found when digging into this issue.
Posted: 21 May 2020 | Published: 21 May 2020


Augmenting Security with Always-On
sponsored by Radware
ANALYST REPORT: The impact of a DDoS attack is massive. Web Services remain unavailable due to volumetric attacks and enterprises incur hefty losses that run into millions. In this Frost & Sullivan report, learn why a hybrid always-on deployment model is the ideal solution to combat sophisticated DDoS attacks.
Posted: 03 Apr 2020 | Published: 03 Apr 2020


Trends & Future Outlook
sponsored by BlueVoyant
EBOOK: Ransomware is one of the costliest and disruptive cyberattacks plaguing organizations, and each year the list of victims grows. In this e-book, take a closer look at the current and emerging ransomware trends including how victims are targeted and proactive measures that can be taken to prevent future attack. Read on to learn more.
Posted: 11 May 2020 | Published: 11 May 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info