Software  >  

Malicious Threats

RSS Feed   
Malicious Threats Reports
 
Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

Cisco Umbrella Case Study: How Leading Digital Innovator Avanade Protects Consultants and Clients
sponsored by Cisco Umbrella
CASE STUDY: Avanade, a leading digital innovator, had a goal of keeping its consultants secure no matter where their work took them. In this case study, find out how Avanade was able to use Cisco Umbrella to do so.
Posted: 24 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

SE Labs Predictive Malware Response Test
sponsored by Cylance
ANALYST REPORT: Uncover findings from SE Labs predictive malware response testing, and learn how an AI technology at the heart of an endpoint protection platform can keep your organization safe from zero-day attacks.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Cylance

Playbook Fridays: Conducting VMRay Malware Analysis
sponsored by ThreatConnect
RESOURCE: Learn about a playbook that takes malicious file samples and transmits them to an automated malware analysis system, to help security teams become more efficient.
Posted: 16 Oct 2018 | Published: 21 May 2018

ThreatConnect

Tufts Medical Center Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: In this case study, learn how Tufts Medical Center adopted cybersecurity platforms to identify previously undetected malicious files and malware, and allowed the organization's focus to remain on delivering safe patient care.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Cylance

How Italy's Largest Service Provider Leverages Security
sponsored by Cisco Umbrella
CASE STUDY: In this case study, find out how Telecom Italia (TIM) was able to keep more than half a million business customers safe, while having a competitive advantage and an incremental revenue opportunity in the process.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Ransomware 101: Three Key Ways to Start Combating Ransomware
sponsored by Splunk
WHITE PAPER: You may ask yourself "how do I defend myself or my organization against ransomware?" and "where do I start?" There are 3 key ways you can combat the rising issue of ransomware. Find out how.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

Splunk

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

Taking a Page from the Hackers’ Handbook: The Power of Human Expertise
sponsored by Rackspace Microsoft
RESOURCE: Learn about Rackspace's managed security services and how they built their hand-selected team of active security analysts to help businesses fight back against today's cyberthreats.
Posted: 07 Aug 2018 | Published: 08 Feb 2018

Rackspace Microsoft
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement