Software  >  

Malicious Threats

RSS Feed   
Malicious Threats Reports
 
Tape as an Airgap Against Ransomware
sponsored by Fujifilm Recording Media USA, Inc.
WEBCAST: Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Fujifilm Recording Media USA, Inc.

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

Panda Security

IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: Distributed denial-of-service (DDoS) attacks are increasingly complex. Even though DDoS prevention technologies are more mainstream than a few years ago, choosing the right vendor or service is challenging. In this research report, explore an assessment of providers offering DDoS prevention and mitigation technologies and services.
Posted: 08 May 2019 | Published: 31 Mar 2019

NetScout Systems, Inc.

Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

2019 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Nation-state adversaries were continuously active throughout 2018. Looking forward, there is ample evidence that adversaries will be forced to adapt and deploy stealthier tactics in order to continue their profitable operations. In this white paper, explore CrowdStrike's recommendations to maintain a strong defense.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Cloud in the Crosshairs
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: In 2018, enterprises continued to wrestle with challenges such as ransomware, insider threats, and DDoS attacks, all while struggling to simplify operations. In this research report, explore key findings from NETSCOUT's 14th annual worldwide infrastructure security report.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

DomainTools

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement