Malicious Threats Reports

Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Royal Holloway: Man proposes, fraud disposes
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Why Ransomware Attacks Are A Growing Threat To Health IT
sponsored by Cisco Umbrella
EGUIDE: Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
Posted: 16 Feb 2017 | Published: 15 Feb 2017

Cisco Umbrella

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

All resources sponsored by OPSWAT inc

Deeper Threats Call for Advanced Threat Detection
sponsored by Solarwinds MSP
EGUIDE: Access this e-guide and discover the necessity of having multiple layers of security and employing multiple technologies in the process. Antivirus technologies are fine for a first measure, but finding advanced threats requires deeper network scans.
Posted: 29 Feb 2016 | Published: 23 Feb 2016

Solarwinds MSP

Artificial Intelligence and Machine Learning: Cybersecurity Advances
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

TechTarget Security

What to Look for in Endpoint Antimalware Tools
sponsored by TechTarget Security
EBOOK: Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.
Posted: 08 Mar 2016 | Published: 07 Mar 2016

TechTarget Security