Malicious Computer Code Reports

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

TechTarget ComputerWeekly.com

Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
sponsored by Cisco Umbrella
WHITE PAPER: Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Cisco Umbrella

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

All resources sponsored by OPSWAT inc

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TechTarget Security

Targeted Cyber Attacks: Infecting the Victim
sponsored by UnitedLex
EGUIDE: This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
Posted: 18 Feb 2016 | Published: 10 Feb 2016

UnitedLex

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella