Blended Threats Reports

Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Clustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
Posted: 08 Feb 2021 | Published: 08 Jul 2020

TechTarget ComputerWeekly.com

Royal Holloway: Man proposes, fraud disposes
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Targeted Cyber Attacks: Infecting the Victim
sponsored by UnitedLex
EGUIDE: This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
Posted: 18 Feb 2016 | Published: 10 Feb 2016

UnitedLex

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

Healthcare Ransomware Attack: Prevention and Backups Are Critical
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TechTarget Security

The Benefits of Investment in Threat Detection
sponsored by ThreatConnect
EGUIDE: This e-guide shows you the value of advanced threat intelligence and why you shouldn't skimp when it comes to protecting your organization's valuable data. Access now for examples from various IT companies about how they justify spending money without seeing a tangible ROI.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

ThreatConnect

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

TechTarget ComputerWeekly.com