Software  >  

Malicious Threats

RSS Feed   
Malicious Threats Reports
 
Boosting Cybersecurity Immunity: Confronting Risks in Today’s Work-From-Home world
sponsored by Capgemini
WHITE PAPER: The spread of COVID-19 has led to a massive and dramatic shift towards working from home and a major increase in email attacks. Learn how you can address the heightened cybersecurity risks that come with the shift towards remote workers and mobile devices.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Capgemini

VMware Carbon Black Cloud Enterprise EDR
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

Coronavirus Credential Phishing
sponsored by Armorblox
WHITE PAPER: As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

COVID-19 Related Data Security Threats
sponsored by Trend Micro
RESOURCE: The global health crisis is dangerous enough as it is which makes the added concern of cyber threats almost overwhelming. Access this resource from Trend Micro to learn what they have observed from studying this type of attack in order to explain how to effectively fight back against them.
Posted: 20 May 2020 | Published: 20 May 2020

Trend Micro

MITRE ATT&CK Workbook
sponsored by VMware International Unlimited Company
WHITE PAPER: The MITRE ATT&CK framework has had a clear objective since its inception: develop a knowledge base around known cyberthreats and tactics to help organizations stay prepared. This workbook is designed as a starting point for organizations interested in leveraging the MITRE ATT&CK framework to improve their security posture.
Posted: 06 May 2020 | Published: 14 Feb 2020

VMware International Unlimited Company

Protect Your Data From Ransomware with Veeam & Cloudian
sponsored by Cloudian
WEBCAST: Dig into this webcast to discover how ransomware works and how Veeam and Cloudian offer customers a way to lock down backup data so it cannot be changed or deleted by ransomware.
Posted: 18 Mar 2020 | Premiered: Feb 19, 2020

Cloudian

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE: Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Trend Micro

CrowdStrike Services Cyber Front Lines Report
sponsored by CrowdStrike
RESEARCH CONTENT: This year’s CrowdStrike report contains observations from the front lines of incident response and proactive services in 2019. Their analysis and lessons learned will add value to your proactive security measures and situational awareness for the rest of 2020. Download the report to get started.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info