logo

Enterprise Endpoint Protection Buyer's Guide

Enterprise Endpoint Protection Buyer's Guide

Provided by Malwarebytes

Businesses are well aware of cybersecurity threats - in fact, in 2017, 80% believe it is likely or very likely they will be attacked. To mitigate this threat, organizations need to invest in multi-layered endpoint security. This new buyer's guide can...

View Abstract

Calculating the Return on Investment in Layered Security

Calculating the Return on Investment in Layered Security

Provided by Malwarebytes

IT security industry has developed new methods and technologies to help reduce the threat of a major breach while reducing the cost of day-today upkeep. The most efficient and sophisticated approach, layered security, integrates the management of these...

View Abstract

Exploit Prevention Stops Modern Threats

Exploit Prevention Stops Modern Threats

Provided by Sophos

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used...

View Abstract

Reporting Cybersecurity to the Board: A CISO's Go-To Guide

Reporting Cybersecurity to the Board: A CISO's Go-To Guide

Provided by BitSight Technologies

Boards need more information about cybersecurity than ever before. Do you know how to present it effectively? Cybersecurity briefings used to be considered inconsequential; a box to check off the list. But today, boards have to consider the regulatory,...

View Abstract

Ransomware: All Locked Up and No Place To Go

Ransomware: All Locked Up and No Place To Go

Provided by Kaspersky Lab

What is ransomware? Ransomware is a type of malware that attempts to extort money from a computer user by infecting or taking control of a victim's machine or the files or documents stored on it. Typically, the ransomware will either lock the computer...

View Abstract

How to Protect Your Business from Ransomware

How to Protect Your Business from Ransomware

Provided by Malwarebytes

Ransomware is on the rise. As businesses brace for attack, we can't help but wonder: What would you do if your company were hit with ransomware? Unfortunately, if you haven't backed up your files, there's nothing much you can do—unless you pay the ransom....

View Abstract

Cybercriminals:  Unmasking the Villain

Cybercriminals: Unmasking the Villain

Provided by Kaspersky Lab

Cybercriminals hide behind anonymity to carry out their crimes, operating under a veil of secrecy to conceal who they are and what they're up to. By understanding the data we collect through our Kaspersky Security Network (KSN) and absorbing the industry...

View Abstract

Top 10 Zero-Day Exploits of 2015

Top 10 Zero-Day Exploits of 2015

Provided by Palo Alto Networks

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day...

View Abstract

Top 10 Zero-Day Exploits of 2015

Top 10 Zero-Day Exploits of 2015

Provided by Palo Alto Networks

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day...

View Abstract

Top 10 Zero-Day Exploits of 2015

Top 10 Zero-Day Exploits of 2015

Provided by Palo Alto Networks

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day...

View Abstract

Search by Category