Malicious Logic Reports

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE: Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

How Ransomware Attacks have Changed
sponsored by CyberArk
EGUIDE: Take a look at this e-guide to uncover an expert perspective that reveals a different kind of ransomware, how ransomware has changed, and how to prevent destruction of service attacks.
Posted: 22 Sep 2017 | Published: 20 Sep 2017

CyberArk

Why it's Time for Locked-Down Desktops
sponsored by Dell, Microsoft and Citrix
EGUIDE: Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix

Ransomware Attacks Plaguing Health IT
sponsored by Cisco Umbrella
EGUIDE: Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

TechTarget ComputerWeekly.com