Malware Resources

Malware news and support resources, featuring the hottest solutions, technologies and vendors in the Malware world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Malware"

Gartner FAQ: What I thought about Black Hat USA 2017

Gartner
So, what did you think of Black Hat this year?” and “Is Black Hat worth going to?” have been FAQs from colleagues and clients alike this week.  So I thought I’d put a very brief summary together.IMO Black Hat USA continues to grow into a better version of the RSA Conference.  Less vendor marketing nonsense.  Fewer suited, […]

Microsoft Video: An introduction to Windows Analytics Update Compliance

Microsoft
Windows Program Manager, Sandeep Deo, demonstrates the new Update Compliance Service in Windows Analytics. Windows Analytics Update Compliance gives you a unified view of the update and anti-malware status of your Windows 10 devices regardless of your management solution. See how you can use it to keep your devices secure and up to date, track […]

Cisco: Deep Dive into AMP and Threat Grid integration with Cisco Email Security

Cisco
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]

Citrix: Is Your Security Architecture the Achilles Heel of Your Financial Business?

Citrix Systems
The recent spotlight on security incidences and breaches against businesses across all industries — including financial organizations — is undoubtedly unnerving for those who are responsible for keeping the businesses safe. For financial services, in addition to this year’s WannaCry ransomware attack, hackers have also used malware to bypass three international banks’ security systems to […]

Citrix Announces NetScaler Secure Web Gateway Solution in NetScaler 12.0

Citrix Systems
Enterprises today face an increasing number of attacks through user’s Internet web sessions. It could be because users are visiting compromised or malicious websites that can lead to stolen identities, malware or botnet installation, data theft and exfiltration or even ransomware infections. In addition, today over half of the web is encrypted. Does that make […]

Citrix: Ace Your Next Audit: Enroll in New Citrix Security Courses

Citrix Systems
Information security is mission-critical to everyone, but especially to companies in highly regulated industries such as healthcare, government and financial services. Your organization is constantly facing new security threats from ransomware to mobile malware, as well as new vulnerabilities that are associated with these mega-trends: Thousands of organizations choose Citrix for centralized control over app […]

Built-in protection against USB security attacks with USBGuard

Red Hat
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the […]

Microsoft: Join our AMA: Ask Microsoft Anything about Windows Server security

Microsoft
On Tuesday, August 8, 2017 from 9:00 AM to 10:00 AM Pacific, we will host a one-hour AMA (Ask Microsoft Anything) session to answer your questions about the security features of Windows Server. In this free session, you’ll be able to ask Microsoft experts your questions about the new layers of protection built into the […]

Government Application Isolation and Control Demo with Video

Bromium
We will be at TechNet Augusta on August 7-11. Visit us at booth 112. We will be at DoDIIS Worldwide Conference on August 13-16 in St. Louis. Visit us at booth 739. Discover how application isolation and containment is the long-term strategy for cyber resilience. If you’re responsible for government cybersecurity, we’ve got something you’ll want […]

Cisco: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints

Cisco
Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]

When cybersecurity fails use application isolation to win

Bromium
We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. The NSA has called out this strategy as the way forward for stopping advanced threats. To many technology folks, Application Isolation may be a new […]

Breachless Threat Reports Reveal Innovation in Cybersecurity

Bromium
Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security […]

New Research Reveals Businesses Choose Productivity over Cybersecurity

Bromium
Despite recent global attacks, internal pressure to limit security puts pressure on IT teams Bromium®, Inc., the pioneer and leader in virtualization-based enterprise security that stops advanced malware attacks, today released results of a survey of 175 security professionals conducted at this year’s Infosecurity Europe, which found that IT security is often deprioritized when it […]

Cisco: How Adversaries Are Refining and Improving Ransomware in 2017

Cisco
Once adversaries have found a method for breaching network defenses, stealing data, or otherwise generating revenue, they’ll continue to refine these tactics to avoid detection and improve effectiveness. Ransomware, one of the more high-profile tools leveraged by adversaries, has undergone this same evolution, as we explain in the Cisco 2017 Midyear Cybersecurity Report. Delivery, obfuscation, […]

Visit our Sponsors!

Close