Software  >  

Malware

RSS Feed   
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 

Malware definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Malware Reports
1 - 25 of 619 Matches Previous Page  |  Next Page
Protect & Recover Your Data with StorageCraft Ransomware Recovery Solutions
sponsored by StorageCraft Technology Corporation
DATA SHEET: The following resource highlights a set of solutions from StorageCraft with which you can combat these attacks. Access now to view the advantages of deploying them and to ensure your last line of defense against ransomware is as resilient as ever.
Posted: 06 Apr 2020 | Published: 31 Dec 2019

StorageCraft Technology Corporation

Augmenting Security with Always-On
sponsored by Radware
ANALYST REPORT: The impact of a DDoS attack is massive. Web Services remain unavailable due to volumetric attacks and enterprises incur hefty losses that run into millions. In this Frost & Sullivan report, learn why a hybrid always-on deployment model is the ideal solution to combat sophisticated DDoS attacks.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

Finding Peace of Mind in Your Security Strategy
sponsored by Rackspace
WEBCAST: As successful breaches continue to plague organizations, it’s more important than ever to evaluate common risk areas and address them accordingly. In this webcast, join the SVP of Security at Alert Logic as they highlight key areas of vulnerabilities and how threats are evolving with organizational infrastructure. Read on to learn more.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Rackspace

Enterprise Security: At the Intersection of DNS and Phishing
sponsored by Nominet
WHITE PAPER: An emerging trend amongst phishing attackers is to target newly registered web domains – which can create significant turmoil in the time it takes to blacklist it. In this white paper, learn more about this emerging threat and discover how security leaders can better combat it.
Posted: 01 Apr 2020 | Published: 01 Apr 2020


Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

A Devastating Assault on Healthcare
sponsored by Blackberry Cylance
WHITE PAPER: The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Blackberry Cylance

COVID-19: Viral in More Ways Than One
sponsored by Dell SecureWorks
WEBCAST: Watch this webcast to learn how threat actors are exploiting fear during the pandemic of COVID-19.
Posted: 30 Mar 2020 | Premiered: Mar 30, 2020

Dell SecureWorks

Morphisec’s 2020 Consumer Healthcare Cybersecurity
sponsored by Morphisec, Inc.
RESEARCH CONTENT: Dive into the latest 2020 Consumer Healthcare Cybersecurity Threat Index from Morphisec to uncover how aware consumers are of their healthcare data security, as well as insights for the year ahead.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Morphisec, Inc.

Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

Three Cybersecurity Challenges Every Enterprise Needs to Address
sponsored by Trustwave
RESOURCE: As organizations continue to adopt transformative technologies, they must be careful to place equal importance on the security of their network and its data. This infographic highlights the 3 key cybersecurity challenges organizations need to address. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Trustwave

How to Recognize and Resist Common Email Cons
sponsored by Trustwave
RESOURCE: The frequency and success of phishing attacks is increasing at an alarming rate. Just when organizations believe they understand how to spot an attempt, hackers come up with new ways to infect inboxes. This infographic outlines how to spot a phishing attack by looking at emerging tactics and how to spot them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Upgrading Existing Security Systems to Agile Quantum-Safe
sponsored by Thales
PRODUCT OVERVIEW: Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Thales

Splunk Security: Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware is, unfortunately, an increasingly frequent and costly attack method. It’s a subset of malware that steals data and holds it ‘hostage’ until a ransom is paid. In this white paper, learn about detecting the early signs of compromise or malicious activity by following this step-by-step journey. Read on to get started.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Splunk

2019 Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Every year, Trustwave releases a Global Security Report that highlights the common cyberattack trends across the year in order to provide organizations with key insights and real-world data so they can be better prepared. Download this report to read through the 2019 Global Security Report.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Trustwave

Definitive Guide to Internet Isolation
sponsored by Menlo Security
EBOOK: In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Menlo Security

Avoiding Top 3 Security Challenges of Digital Transformation
sponsored by Menlo Security
WEBCAST: In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.
Posted: 20 Mar 2020 | Premiered: Mar 20, 2020

Menlo Security

Cloudian Solutions for Ransomware
sponsored by Cloudian
DATA SHEET: With the WORM approach, once data is written, it cannot be changed or deleted until a certain amount of time has passed, and because the data cannot be modified, it cannot be encrypted, making malware ineffective. Check out this datasheet to learn the 3 ways that WORM-equipped storage can be deployed to protect your apps.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Cloudian

A Silver Lining for Security: Cybercrime is on the Rise, but the Cloud Offers Protection
sponsored by HP
WHITE PAPER: Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.
Posted: 18 Mar 2020 | Published: 31 Dec 2019

HP

Protect Your Data From Ransomware with Veeam & Cloudian
sponsored by Cloudian
WEBCAST: Dig into this webcast to discover how ransomware works and how Veeam and Cloudian offer customers a way to lock down backup data so it cannot be changed or deleted by ransomware.
Posted: 18 Mar 2020 | Premiered: Feb 19, 2020

Cloudian

Protect Your Data from Ransomware with Veeam and Cloudian Solution Brief
sponsored by Cloudian
DATA SHEET: Cloudian HyperStore enterprise storage complements on-premise disk-based storage and built-in ransomware protection by providing a local, S3-compliant object storage target for Veeam backups over your local, high-speed network. Dig into this datasheet to discover the use cases of this solution and the 6 benefits it offers.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Cloudian

Microsoft And Morphisec: How to Prevent and Expose Unknown Threats
sponsored by Morphisec, Inc.
WEBCAST: This webinar highlights an emerging threat plaguing today’s organizations at an increasing rate, unknown threats. Join industry experts at Microsoft and Morphisec as they discuss the efficacy of these threats and highlight how to detect and prevent them. Watch the full webinar now.
Posted: 17 Mar 2020 | Premiered: Nov 19, 2019

Morphisec, Inc.

CyberArk Blueprint for Privileged Access Management Success
sponsored by Cyber-Ark Software
WHITE PAPER: In today’s threat landscape, external attackers and malicious insiders routinely exploit privileged accounts to steal sensitive data or cause operational disruptions. To address this, IT security leaders need to rethink their privileged access management (PAM) strategy. Read on to discover a blueprint for PAM success.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software
1 - 25 of 619 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info