Latest
Red Hat Updates Trusted Software Supply Chain to Bolster Security
Wiz Inc. Acquisition Negotiations to Buy Lacework for USD 150M- USD 200M
Armis Inc. Acquires Silk Security Inc. in a Deal Worth USD 150 M
Vorlon Secures USD 15.7M to Address Third-party API Risks
Akamai to Acquire Noname Security Reportedly for USD 500 M
Cohesity Secures USD 150M from IBM Nvidia, Expands Partnership
iPhone Mercenary Spyware Targets Users in 92 Countries
Descope’s New Features Streamline User Onboarding Experience
Sama Launches Sama Red Team for AI Model’s Security Reliability
Cyera’s Series C Funding Reels USD 300M
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
security outcomes report volume 3: achieving secur...
hybrid firewall ck_toolkit_data center firewall...
analyst - gartner workload and network security hy...
use the 2023 mitre attck® evaluations results for...
automate security operations with the multilayered...
current security solutions and user training are n...
detendo adversários ativos...
detenga a los adversarios activos...
stopping active adversaries: lessons from the cybe...
guia da sophos para seguro de proteção digital...
guía de sophos sobre ciberseguros...
sb - simplify wired and wireless network security ...
industry insights – three ways fortinet hybrid m...
kmsat demo: new school security awareness training...
the real world: new-school security awareness trai...
critical considerations when choosing your securit...
2023 phishing by industry benchmarking...
state of email security report...
frost radar: sentinelone is an xdr market leader...
proactive attack surface management for aws worklo...
All
Security
menace of ping flood attacks: a growing network pe...
explore reasons & steps to stop social enginee...
a comprehensive guide on saas risk management...
why is operational technology cybersecurity essent...
what are web application firewalls (wafs)? robust ...
code injection attacks: a guide to security preve...
understanding dictionary attacks in the intersecti...
a guide to cybersecurity asset management...
understanding operational technology security risk...
the best cloud security trends in 2024...
guide on what is zoombombing and preventive measur...
decoding smurf attacks: the concept, mechanics, im...
your go-to security information and event manageme...
managed detection and response: a security imperat...
logic bombs unveiled: safeguarding businesses from...
exploring data center protection strategies...
decoding cross-site scripting (xss): navigating te...
the rise of self-defending networks...
the strategic role of deception technology in thre...
a guide to payment card industry data security sta...
All
Security
red hat updates trusted software supply chain to b...
wiz inc. acquisition negotiations to buy lacework ...
armis inc. acquires silk security inc. in a deal w...
vorlon secures usd 15.7m to address third-party ap...
akamai to acquire noname security reportedly for u...
cohesity secures usd 150m from ibm nvidia, expand...
iphone mercenary spyware targets users in 92 count...
descope’s new features streamline user onboardin...
sama launches sama red team for ai model’s secur...
cyera’s series c funding reels usd 300m...
darktrace plc’s ‘darktrace activeai security p...
microsoft’s unified security operations platform...
priva’s automation expansion service with five n...
tanium partnership with microsoft shares endpoint ...
zafran debuts with usd 30m fund to fast-track vul...
skyflow’s new funds to be used to enhance data p...
google’s new report reveals a rise in zero-day e...
denexus collaborates with cipher for boosted indus...
sekoia aps warns about ‘tycoon 2fa,’ a phishin...
new software supply chain attack on top.gg and git...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Whitepapers
Malware
Malware Whitepapers
PROFICIO CLOUD SECURITY CHECKLIST
Sponsored by:
Proficio
Published By:
Research Desk
Released:
Oct 12, 2023
79% of companies surveyed reported at least one cloud breach in the last 18 months* How secure is your cloud? As more and more organizations begin to host a portion of their infrastructure in th...
Read more
The new world of work, secured by Google
Sponsored by:
Google
Published By:
Research Desk
Released:
Sep 08, 2022
The way we work has dramatically changed. We’re generating more sensitive data than ever before – and storing it in the cloud for easy access anywhere in the world. By sharing it with both interna...
Read more
Virtual Ultimate Test Drive Cloud-Delivered Security Services
Sponsored by:
Palo Alto
Published By:
Research Desk
Released:
May 02, 2022
Learn the value of preventing and detecting unknown malware, zero-day exploits, APTs and other advanced cyberattacks. Find out how to tie them to specific users and devices so they can be stopped quic...
Read more
MSPs: Your checklist for hero-worthy, security-focused BaaS
Sponsored by:
Veeam
Published By:
Research Desk
Released:
Mar 04, 2022
32% of organizations expect cyber threats to impact their business in the next year. If one of your customers is faced with a ransomware attack, will you be able to answer the call? In this eBook, ...
Read more
State of Encrypted Attacks:
Sponsored by:
Zscaler
Published By:
Research Desk
Released:
Dec 22, 2021
Enterprise data security seems to suffer from a widespread misunderstanding of this question. HTTPS (i.e., TLS, formerly SSL) is the industry standard for encryption and it protects data in transit. I...
Read more
The 3 riskiest cloud applications of 2021
Sponsored by:
Cisco
Published By:
Research Desk
Released:
Nov 23, 2021
Are you using vulnerable cloud apps that open the door to ransomware, malware, or other types of network attacks? Our Cisco Umbrella infographic reveals the three riskiest ones in 2021....
Read more
2021 State of Malware Report
Sponsored by:
Malwarebytes
Published By:
Research Desk
Released:
Jul 08, 2021
If 2020 taught us anything, it's that cybercrime stops for nothing. What’s more—it adapts. Broadside attacks are out, precision is in, and ingenuity lies behind several new malware types and attac...
Read more
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security
Sponsored by:
Crowdstrike
Published By:
Research Desk
Released:
Dec 01, 2020
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new...
Read more
NSS Labs AEP 4.0 Test Results
Sponsored by:
Paloalto
Published By:
Research Desk
Released:
Oct 08, 2020
NSS Labs just released the results of its 2020 Advanced Endpoint Protection (AEP) Test, which evaluates the efficacy and strength of various endpoint security offerings across a number of categories, ...
Read more
Malwarebytes Endpoint Detection and Response
Sponsored by:
Malwarebytes
Published By:
Research Desk
Released:
Jul 11, 2020
We would like to share with you exclusive report that explains how digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know th...
Read more
Posts navigation
1
2
3
Next
Whitepapers
News
Insights
Security
Security
Security