malware

Results 251 - 275 of 849Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
Download this white paper and find out how you can turn your biggest vulnerability into a key layer of your network security defense.
Tags : 
infoblox, network security, dns based attacks, next generation firewalls, malware attacks, dns servers, dns infrastructure, internal attacks, external attacks
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
This white paper gives you an overview of how you can secure external DNS from cyberattacks and secure internal DNS from infrastructure attacks, APTs and malware that exploit DNS, and data exfiltration via DNS.
Tags : 
infoblox, dns security, cyberattacks, apts, malware
    
Infoblox
Published By: Mimecast     Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
mimecast, security, ransomware, cybersecurity
    
Mimecast
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: Dell     Published Date: Aug 28, 2015
Download this white paper to lean more about how Dell's Connected Security solutions give you the power to solve your security and compliance challenges today, while proactively keeping you one step ahead of tomorrow’s threats.
Tags : 
cybersecurity, dell, government, compliance, apt, cybercriminal activity, spam, malware, dell connected security solutions
    
Dell
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Proofpoint     Published Date: Dec 21, 2018
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
    
Proofpoint
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
Change is a constant in security. Threats are constantly changing to evade security defenses and to reach their objectives. Oddly, some categories of secuirty defenses have remained essentially unchanged. Anti-malware has been among the "unchanged".
Tags : 
anti-malware, security, defenses, unchanged, traditional, approach
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
The Webroot solution provides customers with a layered approach to security including products for Web and email security, email archiving and endpoint security. Offerings can be implemented as an integrated suite or as individual point products.
Tags : 
solution, malware, email archiving, endpoint security, individual point products, web
    
Webroot UK
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : 
palo alto, botnets, firewall, malware
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Introducing WildFire: the Next-Generation of Malware Defense
Tags : 
palo alto, malware, wildfire
    
Palo Alto Networks
Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
    
Zscaler
Published By: Mimecast     Published Date: Apr 18, 2017
"Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack."
Tags : 
ransomware, cyber security, mimecast, fraud protection
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
ransomware, mimecast, security, cyber attacks
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : 
office 365, email security, risk assessment, security services, malware, security solutions
    
Mimecast
Published By: Symantec     Published Date: Jul 28, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.