Software  >  

Malicious Threats

RSS Feed   
Malicious Threats Reports
 
Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Economics of Insecurity
sponsored by Cylance
WHITE PAPER: Traditional AV companies don't want to help you prevent attacks. They want to help you react to breaches - so they can sell you more solutions with every intrusion. It's all part of the "Economics of Insecurity". Tired of the status quo and investing in more of the same old technology? Learn why it's time to think beyond the stack.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Cylance

Inside Commvault's Holistic Data Protection Center
sponsored by Commvault
RESOURCE: Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Commvault

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018

Semafone

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Don't find yourself forced to pay for a simple oversight. Use this white paper as your guide to creating a rock-solid data availability plan by making backup images invisible, frequently testing your environment, and more.
Posted: 20 Nov 2017 | Published: 31 Jan 2017

Veeam Software

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement