Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 869 Matches Previous Page  |  Next Page
Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

The Security Practice Maturity Model: Where Do You Stand?
sponsored by Juniper Networks
RESOURCE CENTER: In this custom article, learn how your organization can take a simplified approach towards advanced threat protection and apply cyber-automation to its security strategy, today.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Juniper Networks

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: Learn how your enterprise can benefit from shifting from a traditional security approach to advanced malware detection, today.
Posted: 14 Aug 2018 | Published: 31 Dec 2015

Dell SecureWorks

Leading Legal Firm Implements the Fidelis Platform to Protect Clients From Advanced Attacks
sponsored by Fidelis
CASE STUDY: Domański Zakrzewski Palinka, the leading law firm in Poland, needed to protect sensitive client data from increasingly sophisticated cyberattacks. Learn about the modern security strategy that provided them an ability to detect both known and unknown threats.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fidelis

A Guide to Endpoint Privilege Management Security Fundamentals
sponsored by Avecto Ltd
WHITE PAPER: Learn what endpoint privilege management is and how it helps defend against malware threats. Plus, get tips on how to deploy endpoint privilege management technology that fits into your existing security systems.
Posted: 09 Aug 2018 | Published: 08 Aug 2018


How to Execute Anomaly Detection at Scale
sponsored by Dataiku
RESOURCE: A strong data science team and tools can provide top-notch anomaly detection for your organization. This resource provides an overview of anomaly detection, how it works, and when to apply it.
Posted: 08 Aug 2018 | Published: 31 Dec 2017

Dataiku

Taking a Page from the Hackers’ Handbook: The Power of Human Expertise
sponsored by Rackspace Microsoft
RESOURCE: Learn about Rackspace's managed security services and how they built their hand-selected team of active security analysts to help businesses fight back against today's cyberthreats.
Posted: 07 Aug 2018 | Published: 08 Feb 2018

Rackspace Microsoft

How to Reduce Your Organization's Digital Attack Surface & Cyber Risk
sponsored by IntSights
ANALYST REPORT: Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.
Posted: 07 Aug 2018 | Published: 30 Jun 2018

IntSights

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER: Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Age of the Cyber Hunter: How a New Generation of Threats Changed the Cybersecurity Paradigm
sponsored by Rackspace Microsoft
WHITE PAPER: Effective security now requires firms to assume penetration and continually scan their environments for ongoing malicious activity. In this white paper, take a closer look at today's advanced persistent threats, and explore state-of-the-art techniques and technologies to detect and counteract them.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft

Your People are Your Biggest IT Security Threat
sponsored by Rackspace Microsoft
WHITE PAPER: Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft

Report: Securing the Enterprise Against Cyberattacks
sponsored by Akamai Technologies
ANALYST REPORT: 71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.
Posted: 03 Aug 2018 | Published: 30 Jun 2018

Akamai Technologies

Understanding Cyberattacks
sponsored by Panda Security
WHITE PAPER: It is critical to understand the cyber-kill chain for identifying threats throughout the different stages of an attack lifecycle. There are 7 basic steps to the cyber-kill chain. Download this white paper to discover details on all of them to halt cyberattacks in their tracks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

Top Priorities as New Cyber Threats Plague Healthcare
sponsored by Fortinet, Inc.
WEBCAST: Listen to security professional, Anthony K Giandomenico, give insights on how to help slow down and prevent fast moving cyberattacks and threats in the health care industry.
Posted: 05 Jul 2018 | Premiered: Jul 5, 2018

Fortinet, Inc.

Fighting Cybercrime with Artificial Intelligence
sponsored by Fortinet, Inc.
WEBCAST: Download this webcast to learn how AI and machine learning can nullify known malware, and manage new malware before you feel the pain.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Dynamic Cyber Defenses: A Fresh Approach to an Old Problem
sponsored by ThreatX
RESEARCH CONTENT: In this Frost & Sullivan report, learn why the standard approach of blocking malicious activity has structural shortcomings, and how these prevention shortcomings favor attackers. Also uncover insight about a cloud-based deception approach and a rule-less WAF.
Posted: 02 Jul 2018 | Published: 06 Apr 2018

ThreatX

Fighting Cybercrime with Artificial Intelligence
sponsored by Fortinet, Inc.
WEBCAST: What will the role of AI be in fighting cybercrime? Listen in as SANS analyst, Dave Shackleford, digs into a specific implementation of a deep learning system to do just that.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Fortinet, Inc.

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

By the Numbers: Ransomware and Patient Data Breaches in Health IT
sponsored by Cisco Umbrella
EGUIDE: Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

How Cloud Security Keeps Patient and Employee Data Safe at Memorial Hermann Health System
sponsored by Cisco Umbrella
CASE STUDY: In this case study, learn about how Memorial Hermann Health System found a solution that integrated with their existing security stack, to better protect patients and providers against ever-evolving threats.
Posted: 10 Jul 2018 | Published: 29 Dec 2017

Cisco Umbrella

The Inside Story of Data Breaches and Mainframe Security
sponsored by CA Technologies
RESEARCH CONTENT: 31% of consumers discontinued their relationship with a company that had a data breach (Reputation Risk Study 2017). Don't let your organization become a statistic. Read on.
Posted: 05 Jul 2018 | Published: 31 Dec 2017

CA Technologies
1 - 25 of 869 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement