TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Exploits. Intercepted

by SophosDec 08, 2016

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read this paper to learn more about exploits and how to stop them.

  • Sophos
  • Security Management & Analytics
  • Security Monitoring
  • Details

Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes: Five Things Every Business Executive Should Know About Cybersecurity Why Poor Cyber Hygiene Invites Risk The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints Improving the Security Conversation for CIOs, CISOs, and Board Members Download the issue today!

The information submitted is collected by both UBM and our

  • Dark Reading
  • Cybersecurity
  • Security
  • Security Monitoring
  • Endpoint Security
  • Strategic CIO
  • Risk Management/Security
  • Details

5 Ways to Transform Business Processes

by K2Nov 21, 2016

Make Your Processes Agile and Your Business Competitive

Historically, large companies have hampered process agility by locking themselves into outdated systems, processes, and ways of working, but a variety of factors - including modernization and customer expectations - are increasingly playing a role in driving companies toward business process transformation.

Based on Process Excellence Network's 5 Ways to Transform Business Processes to Optimize Agility, this white

  • Digital Business
  • Executive Insights & Innovation
  • K2
  • Details

Cybercriminals: Unmasking The Villain

by Kaspersky LabNov 17, 2016

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures.

Have you ever wondered who they are? What countries they come from? Who are their top targets?

As a leader in cybercrime analysis, Kaspersky Lab's GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the

  • Kaspersky Lab
  • Cybersecurity
  • Security Monitoring
  • Details

The Threats From Within

by Kaspersky LabNov 17, 2016

Your employees are your most valuable asset. But they can also be the weakest link in your security chain.

According to Kaspersky Lab research, 73% of organizations had an internal security incident in 2015. Whether accidental or intentional, employees often cause internal data breach issues that can severely compromise your business.

Download our eBook, The Threats from Withinz; How Educating Your Employees on Cybersecurity Can Protect Your Company, to access invaluable

  • Kaspersky Lab
  • Security Management & Analytics
  • Security Monitoring
  • Details

The Dangers Of Phishing: Help Employees Avoid The Lure Of Cybercrime

by Kaspersky LabNov 17, 2016

Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the biggest threats to corporate IT security. In fact, Kaspersky Lab's own research shows that in the aftermath of a phishing attack, professional services are usually required to restore normal service, leading to costly budget overruns.Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the

  • Kaspersky Lab
  • Cybersecurity
  • Security Management & Analytics
  • Details

Ransomware: All Locked Up And No Place To Go

by Kaspersky LabNov 17, 2016

News stories about ransomware are becoming a daily event. Hospitals, government agencies and individuals have all been hit by this growing menace, and the threat is only going to grow. As cybercriminals learn just how effective this method of extortion is, Kaspersky Lab experts predict that ransomware attacks will become increasingly targeted at organizations most likely to pay.

But there is hope. By learning the tactics behind ransomware, you can stop an attack from happening in the

  • Kaspersky Lab
  • Security Management & Analytics
  • Security Monitoring
  • Details

Healthcare Ransomware: Hospitals On Hold

by Kaspersky LabNov 17, 2016

Hospital operations coming to a grinding halt. Patients being admitted by handwritten records. And a mysterious message explaining that the only way to get things back up and running is to pay a ransom. It's a scenario that is all too familiar to many hospitals around the country, and it's only getting worse as cybercriminals realize how easily they can penetrate the weak security at many hospitals.

How does a healthcare organization protect itself and keep operations running

  • Kaspersky Lab
  • Cybersecurity
  • Mobile security
  • Details

Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats

  • Digital Shadows
  • Cybersecurity
  • Risk Management/Security
  • Details

Ransomware is Increasing the Risks & Impact to Organizations

by mimecastNov 11, 2016

Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently ransomware has been gaining momentum.

Learn about this threat, its impact and ways to avoid attacks.

  • mimecast
  • Security Management & Analytics
  • Security Monitoring
  • Details