Software  >  

Malicious Software

RSS Feed   
Malicious Software Reports
 
Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Neustar

5 Ways Ransomware Attacks Backup Software
sponsored by Cohesity
RESOURCE: It's important to keep five critical considerations in mind when you're strategizing how best to prevent, detect, and rapidly respond to a ransomware attack on your backups. View them in this resource.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Cohesity

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

Panda Security

Ransomware Defense and Survival
sponsored by Veeam Software
EBOOK: This e-book digs deep into the scope, impact, and intricacies of ransomware, and includes a detailed discussion on effectively fighting it and the unexpected costs of recovery. Download it now to put the above to use in your organization and to learn 7 standard operating procedures for responding to an attack.
Posted: 25 Apr 2019 | Published: 31 Dec 2018

Veeam Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

Trend Micro, Inc.

Why Enterprise Anti-Virus Isn't Working
sponsored by Ziften
RESOURCE: The name itself, anti-virus, betrays the inadequacy of the enterprise AV threat model. In this blog, learn more a new and improved next generation anti-virus (NGAV) which generally incorporates behavior analytics, cloud-based delivery, machine learning and artificial intelligence, and more automated response.
Posted: 15 Apr 2019 | Published: 09 Apr 2019

Ziften

The Changing Face of Cyber Attacks
sponsored by Neustar
WHITE PAPER: The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.
Posted: 17 Jan 2019 | Published: 07 Jan 2019

Neustar

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Enterprises Wear Large Targets in Cloud Cryptomining Hacks
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.
Posted: 23 Aug 2018 | Published: 28 Mar 2018

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement