Software >
|
Malicious Software
|
|
Malicious Software Reports
|
|
The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE:
In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020
|
|
|
Ransomware Playbook
sponsored by AWS Rapid7
EBOOK:
Victims of ransomware attacks suffer the impact of productivity and revenue loss due to work stoppage. Plus, these businesses are likely to have to manage communications with the press, customers, prospects and vendors. It’s time to start taking action and lower your ransomware risk. This e-book provides ample first steps.
Posted: 11 Dec 2020 | Published: 11 Dec 2020
|
|
|
Approaches to Micro-Segmentation: Pros and Cons
sponsored by ColorTokens
RESOURCE:
Micro-segmentation is emerging as one of the most effective methods in combating lateral threats that perimeter security fails to protect against. This article provides an overview of the 3 primary approaches to micro-segmentation, including the pros and cons of each approach – read on to get started.
Posted: 05 Oct 2020 | Published: 22 Apr 2020
|
|
|
Stimulus Phishing Report: The Newest Wave of Pandemic Phishing Attacks
sponsored by Inky Technology
WHITE PAPER:
Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.
Posted: 02 Dec 2020 | Published: 02 Dec 2020
|
|
|
Clearedin Office 365, Exchange Online Protection (EOP) and Secure Email Gateway (SEG) Solution
sponsored by Clearedin
WHITE PAPER:
Office 365 (O365) applications are used by many in the rapidly expanding remote workforce. However, while these apps have native anti-phishing measures in place, you may need additional layers of protection to prepare for more sophisticated threats. Click here to learn how to properly supplement your O365 security.
Posted: 05 Jan 2021 | Published: 05 Jan 2021
|
|
|
Spear Phishing: Top 3 Impersonation Attacks
sponsored by Barracuda
WHITE PAPER:
Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
Learning from COVID-19: Security and Continuity Planning
sponsored by Panda Security
EBOOK:
As organizations search for ways to improve network performance in the wake of almost-ubiquitous remote work, security threats loom larger and larger. But IT professionals cannot face this challenge alone – they need a set of guidelines to manage security and continuity planning. Read this in-depth e-book to learn some of these guidelines.
Posted: 12 Oct 2020 | Published: 12 Oct 2020
|
|
|
How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO:
Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020
|
|
|
Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE:
A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020
|
|
|
Panda Security Threat Insights Report 2020
sponsored by Panda Security
RESEARCH CONTENT:
In 2020, protecting endpoints against known threats is no longer enough. IT environments must be protected against the unknown as well. After all, once a spotlight is thrown on a cyber threat, new ones will attempt to sneak by in the shadows.
Posted: 06 Oct 2020 | Published: 06 Oct 2020
|
|
|
|
|