Blended Threats Reports

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

Royal Holloway: Man proposes, fraud disposes
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 08 Feb 2021 | Published: 14 Jul 2020

TechTarget ComputerWeekly.com

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
sponsored by Kaspersky
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016

Kaspersky

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Targeted Cyber Attacks: Infecting the Victim
sponsored by UnitedLex
EGUIDE: This e-guide goes in-depth examining the most popular attacks used by hackers and what steps you need to take to defend yourself.
Posted: 18 Feb 2016 | Published: 10 Feb 2016

UnitedLex

By the Numbers: Ransomware and Patient Data Breaches in Health IT
sponsored by Cisco Umbrella
EGUIDE: Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black