Below you will find reports with the tag of “Malware” Threats Report - December 2016 An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software. (more available) Added: October 26, 2018 2015 Threats Report In this report, McAfee looks back on the past 5 years of cyber threats. They then breakdown two key points, 1) How do attackers enter a malware infected system and exfiltrate information and 2) Cyber attacks on graphic processing units and (GPU) devices. (more available) Added: October 25, 2018 2015 Trustwave Global Security Report The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe. (more available) Added: October 25, 2018 2016 Data Breach Investigations Report Verizon’s annual report on data breaches in 2016 Added: October 25, 2018 2016 Hacked Website Report Q3 This is an annual report that discusses the latest malware and hacking trends in compromised websites. Added: October 25, 2018 2016 State of SMB Cybersecurity This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000. (more available) Added: October 25, 2018 2016 State of Vulnerability Risk Management The goal of this report is to shed some light on the current threat landscape for organizations, assess the strengths and weaknesses of current vulnerability evaluation systems such as CVSS, (Common Vulnerability Scoring System) and explore additional metrics for determining the risk of a vulnerability. (more available) Added: October 25, 2018 2017 Annual Security Report The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats. (more available) Added: October 25, 2018 2018 Application Protection Report In this report, they examine that series of interacting tiers—application services, application access, Transport Layer Security (TLS), domain name services (DNS), and the network—because each one is a potential target of attack. (more available) Added: October 25, 2018 2018 Global Study On Application Security Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice. (more available) Added: October 25, 2018 2018 Incident Response Insights Report This report shares insights and valuable lessons from an examination of the threats in 2017. Added: October 25, 2018 Addressing The Australian Signals Directorate Essential Eight In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines. (more available) Added: October 25, 2018 BTCWare Ransomware This paper takes a look at a smaller Ransomware family that has not received as much press as the other bigger ransomware families. (more available) Added: October 25, 2018 Cloud Security Spotlight 2018 Here is a report based on collaboration from a variety of cybersecurity insiders. Added: October 25, 2018 Crowdstrike Services Casebook Report 2017 This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks. (more available) Added: October 25, 2018 Cyber Threats To International Organizations And Non-Profits Gain insights into the nature and rationales of cyber threats international organizations and nonprofits face. Added: October 25, 2018 Cyber Value Connection This report was created to present The Cyber-Value Connection, which is intended to put cyber security in a context that will resonate with business leaders. The Cyber-Value Connection looks at the reduction in company value that arises from a cyber breach, vividly demonstrating how a sever incident leads to a decline in share price. (more available) Added: October 25, 2018 Cybercrime against Businesses, 2005 This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005. Added: October 25, 2018 DeepGaurd: Proactive On-host Protection Against New And Emerging Threats This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products. (more available) Added: October 25, 2018 Defending Government Against Ransomware Attacks This paper takes a look at cloud sandboxing and how that can be used to protect governments from Ransomware. Added: October 25, 2018 Definitive Guide To Cloud Thread Protection In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today. (more available) Added: October 25, 2018 «« « 44 45 46 47 48 » »»
Threats Report - December 2016 An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software. (more available) Added: October 26, 2018
2015 Threats Report In this report, McAfee looks back on the past 5 years of cyber threats. They then breakdown two key points, 1) How do attackers enter a malware infected system and exfiltrate information and 2) Cyber attacks on graphic processing units and (GPU) devices. (more available) Added: October 25, 2018
2015 Trustwave Global Security Report The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe. (more available) Added: October 25, 2018
2016 Data Breach Investigations Report Verizon’s annual report on data breaches in 2016 Added: October 25, 2018
2016 Hacked Website Report Q3 This is an annual report that discusses the latest malware and hacking trends in compromised websites. Added: October 25, 2018
2016 State of SMB Cybersecurity This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000. (more available) Added: October 25, 2018
2016 State of Vulnerability Risk Management The goal of this report is to shed some light on the current threat landscape for organizations, assess the strengths and weaknesses of current vulnerability evaluation systems such as CVSS, (Common Vulnerability Scoring System) and explore additional metrics for determining the risk of a vulnerability. (more available) Added: October 25, 2018
2017 Annual Security Report The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats. (more available) Added: October 25, 2018
2018 Application Protection Report In this report, they examine that series of interacting tiers—application services, application access, Transport Layer Security (TLS), domain name services (DNS), and the network—because each one is a potential target of attack. (more available) Added: October 25, 2018
2018 Global Study On Application Security Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice. (more available) Added: October 25, 2018
2018 Incident Response Insights Report This report shares insights and valuable lessons from an examination of the threats in 2017. Added: October 25, 2018
Addressing The Australian Signals Directorate Essential Eight In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines. (more available) Added: October 25, 2018
BTCWare Ransomware This paper takes a look at a smaller Ransomware family that has not received as much press as the other bigger ransomware families. (more available) Added: October 25, 2018
Cloud Security Spotlight 2018 Here is a report based on collaboration from a variety of cybersecurity insiders. Added: October 25, 2018
Crowdstrike Services Casebook Report 2017 This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks. (more available) Added: October 25, 2018
Cyber Threats To International Organizations And Non-Profits Gain insights into the nature and rationales of cyber threats international organizations and nonprofits face. Added: October 25, 2018
Cyber Value Connection This report was created to present The Cyber-Value Connection, which is intended to put cyber security in a context that will resonate with business leaders. The Cyber-Value Connection looks at the reduction in company value that arises from a cyber breach, vividly demonstrating how a sever incident leads to a decline in share price. (more available) Added: October 25, 2018
Cybercrime against Businesses, 2005 This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005. Added: October 25, 2018
DeepGaurd: Proactive On-host Protection Against New And Emerging Threats This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products. (more available) Added: October 25, 2018
Defending Government Against Ransomware Attacks This paper takes a look at cloud sandboxing and how that can be used to protect governments from Ransomware. Added: October 25, 2018
Definitive Guide To Cloud Thread Protection In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today. (more available) Added: October 25, 2018