Malicious Software Reports

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Why Security in DevOps is Essential to Software Development
sponsored by TechTarget Security
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TechTarget Security

Hospital Network Security: Recursive DNS Lookups Yield Threat Insight
sponsored by Cisco Umbrella
WHITE PAPER: Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Cisco Umbrella

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by TechTarget Security
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

TechTarget Security

By the Numbers: Ransomware and Patient Data Breaches in Health IT
sponsored by Cisco Umbrella
EGUIDE: Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Healthcare Ransomware Attack: Prevention and Backups Are Critical
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Crafting a Secure Endpoint Management Strategy
sponsored by Vox Mobile Solutions
EGUIDE: Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions