Software  >  

Malicious Threats

RSS Feed   
Malicious Threats Reports
 
Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Ransom Mafia. Analysis of The World’s First Ransomware Cartel
sponsored by Analyst1
RESEARCH CONTENT: Analyst1 produced a report to better understand and defend against advanced ransomware attackers, like Twisted Spider, Viking Spider, Lockbit Gang, etc. Download the report to uncover their findings.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Malware
Analyst1

Webinar - Summer school gone virtual? How to keep virtual activities safe for students
sponsored by Cisco Umbrella
WEBCAST: Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.
Posted: 01 Jul 2020 | Premiered: May 18, 2020

Cisco Umbrella

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

Webinar - Simplicity is the new complexity – How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

How to Create a Ransomware Incident Response Plan
sponsored by DigitalXRAID
EGUIDE: Ransomware is rapidly becoming one of today’s most persistent (and potentially devastating) cyberthreats. In fact, according to Forbes, the average amount of reported ransomware transactions per month in 2021 was $102.3 million. Read this e-guide to unlock 9-steps designed to help you build an effective ransomware mitigation strategy.
Posted: 28 Dec 2021 | Published: 28 Dec 2021

TOPICS:  Malware
DigitalXRAID

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE: Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

ConvergeOne

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences