Malicious Code Reports

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Best Practices for Monitoring Today's Murky Threat Environment
sponsored by Hewlett Packard Enterprise
EGUIDE: In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.