Software  >  

Malicious Software

RSS Feed   
Malicious Software Reports
 
Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella

The Secret to Combating Fileless Attacks
sponsored by Cylance
RESOURCE: Fileless malware is the danger to your system that threat detection methods likely aren't picking up on. Download this resource to learn how to detect fileless malware and for ways to combat a fileless attack.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

Ransomware Defense For Dummies
sponsored by Cisco Umbrella
EBOOK: Take a look at this Ransomware Defense for Dummies e-book for 5 short chapters that explore how ransomware operates and its defining characteristics, security best practices to reduce ransomware, and more.
Posted: 29 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Solution Overview: Iron Cloud Critical Protection and Recovery
sponsored by Iron Mountain
PRODUCT OVERVIEW: This product overview highlights a managed data protection solution that copies essential data to its secure data center over a private, encrypted network connection. Read on for this iron defense strategy to keep threats like ransomware at bay.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Iron Mountain

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Predictive Intelligence: Pre-Crime for IT
sponsored by Cisco Umbrella
EBOOK: Find out how to take a proactive stance against phishing and advanced malware attacks with a cloud-based security service that identifies and predicts attack infrastructure before bad actors can negatively impact your organization.
Posted: 29 Aug 2018 | Published: 31 Dec 2016

Cisco Umbrella

2018 Cyberthreat Defense Report
sponsored by Gigamon
RESOURCE: Did you know that 77.2% of businesses were victim to at least 1 cyberattack in 2017, and 62.3% expect to be targets by the end 2018? Download this Cyberthreat Defense Report resource and uncover more key results.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

By the Numbers: Ransomware and Patient Data Breaches in Health IT
sponsored by Cisco Umbrella
EGUIDE: Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Dark Bot Survival Guide
sponsored by Oracle Dyn
EBOOK: What does your bot survival strategy look like? Uncover this dark bot survival guide to learn more about effective web security strategies and how to put bot detection methods to the test.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Oracle Dyn

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement