Products of the Year 2006
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
Keeping Up with Today’s Top Mobile Spyware Threat Trends | APAC\EMEA
By:
Type: Talk
According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo
These are also closely related to: "Products of the Year 2006"
-
Keeping Up with Today’s Top Mobile Spyware Threat Trends | AMER
By:
Type: Talk
According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo
-
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears over the growth of targeted mobile phone hacks are increasing. Our annual salary survey highlights the diversity challenge in IT, with men’s support for helping women in IT declining. And we look at how datacentre operators are examining heat reuse to reduce their climate impact. Read the issue now.
Find more content like what you just read:
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
-
What is Mobile Threat Defense (MTD)?
By: JAMF
Type: Blog
Implement AI-powered mobile threat defense to protect remote workers from malware, phishing, and network attacks. Learn how mobile threat defense solutions can secure your device fleet and safeguard enterprise data. Read the full blog post to discover the benefits of this comprehensive endpoint security.
-
Is malware using steganography on your network?
By:
Type: Video
As cyber threats become more evasive, technology that protects organisations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. Join Steve Jeffery, Lead Solutions Engineer for Fortra Email Security, as he outlines how malware can leverage steganography and how to recognise your risk even if it can’t be seen. You'll also learn:
-
10 must-have cloud firewall capabilities
By: SonicWall
Type: White Paper
In the face of sophisticated cyberthreats, many businesses have prioritized leveling up their cloud security. One way to accomplish that mission is by adopting a modern cloud firewall. But what constitutes such a firewall? Discover 10 must-have capabilities in this white paper.
-
Simplify desktop management and reduce costs by up to 40%
By: DellEMC and Intel®
Type: eGuide
This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.
-
Living Off The Land Attacks
By: CyberFOX
Type: eBook
Cybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.
-
Mobile security moving to a unified approach
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
-
Security as a service for MSP peace of mind
By: WatchGuard Technologies, Inc.
Type: White Paper
Download this portfolio to learn more about WatchGuard's managed security service solutions, which give MSPs peace of mind through better endpoint management and comprehensive protection across your entire service ecosystem.
-
Complying with CPS 234: Proactive Protective Procedures
By:
Type: Video
2020 marked the onset of a digitization juggernaut. While businesses were busy restructuring for online operations to brace the pandemic, nearly every organization in Australia observed a sizeable increase in the frequency of spyware and trojan attacks masked under interactive coronavirus maps and websites. what you will learn : The APRA Prudential Standard CPS 234 aims to fill these gaps in the existing cybersecurity framework and elevate the existing security best practices and preparedness. It will make protection levels more stringent as regulated entities will have to demonstrate compliance with the standard rather than just following the guidance. This also means that sprawling your workloads across multiple clouds is going to get a bit more complex and will come with added responsibility. Enterprises will need the capability to secure their data, ability to thwart potential breaches, and better control over diverse cloud environments
-
Top 10 cyber security stories of 2021
By: TechTarget ComputerWeekly.com
Type: eBook
Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
-
Using Intelligence To Safeguard Your Supply Chain Against Cyber Risks
By:
Type: Talk
Security teams are undergoing pressure to monitor and respond to indirect threats to their organisation. New thinking about safeguarding your supply chain has expanded beyond just stolen certificates and code injections targeting your software vendors. Phishing, ransomware, and spyware attacks against any of your partners can also disrupt business continuity or disclose sensitive data that affects you. Join Silobreaker and (ISC)² on 13 September 2022 at 1:00 pm BST to learn about some of the most recent supply chain incidents and best practices to build an effective intelligence programme, helping you navigate the threats beyond your control. In this webinar, you will learn: • The impact of recent supply chain incidents • How to monitor compromised vendors across your supply chain • How to identify when specific threats and risks are trending up so you can be ready to respond • Best practices to build an effective intelligence programme that addresses your risks, without overloading your analysts
-
CW ASEAN: Trend Watch – Security
By: TechTarget ComputerWeekly.com
Type: Ezine
Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
2023 Mobile Threat Landscape Overview
By:
Type: Talk
Last year saw many changes in the mobile threat landscape: Google limited the access that malicious application can have on an infected device; at the same time new actors entered the mobile space (drawn in by potential gains from fraud) bringing with them new tactics such as the biometric bypass. Join ThreatFabric's Mobile Threat Intelligence Experts in this 45-minute webinar aimed at providing a comprehensive overview of the trends and most relevant changes in the mobile threat landscape in 2023, with an eye towards what may be in store in 2024. The aim is to provide you with actionable insights that allow you to make informed decisions and adopt a pro-active approach to mitigating mobile security risks. Topics covered will include trends in distribution techniques aimed at defeating security measures introduced with Android 13, new attack techniques, the use of spyware in financial fraud, monetisation schemes, as well as our predictions and insights into future developments around the introduction of instant payment systems and third-party app stores.
-
How do cybercriminals steal credit card information?
By: TechTarget ComputerWeekly.com
Type: eGuide
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
MicroScope – February 2023: Opportunities in security
By: MicroScope
Type: Ezine
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
-
GReAT Ideas. Powered by Croissant. Baguette edition.
By:
Type: Replay
GReAT Ideas is back this winter with more cyberthreat research and top-notch expertise, alongside light-hearted talks on the latest developments in the field of cybersecurity, shared in a cozy informal atmosphere. Executed by security researchers from Kaspersky’s Global Research and Analysis Team (GReAT), who specialize in uncovering APTs, cyber-espionage campaigns, major malware and underground cyber-criminal trends across the world, the event is designed to exchange knowledge, support and inspire the community. The event will kick off with a fireside chat about recent cyber-incidents that shook the world. The special Baguette edition (a name suggested by our speakers) of the event will feature presentations by our Paris-based GReAT team – as, we all need a bit of French charm in our lives. Here is what you will learn during this webinar: What’s on: fireside chat with Warren Mercer from Talos and Brian Bartholomew from Kaspersky Mercenaries’ tricks: what did DeathStalker hide between two ferns? by Pierre Delcher A primer on reversing Delphi binaries by Ivan Kwiatkowski TinyCheck: bug smartphone spyware at network level by Felix Aime
-
A MythBusting Special — 9 Myths about File-based Threats
By:
Type: Replay
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown sources, executing the first step in a cyber attack. This continues to happen whether the file is an EXE or a Microsoft Excel document. Far too often, end users have an illusion of security, masked by good faith efforts of other users and (ineffective) security controls. This creates a virality effect for ransomware, malware, spyware, and annoying grayware and adware to be spread easily from user to user and machine to machine. To stop users from saying “I reject your reality and substitute my own!” – it’s time to bust some myths about file-based attacks. Testing in three! Two! One! Join Zscaler’s Vinay Polurouthu, Principal Product Manager, and Amy Heng, Product Marketing Manager, to: *Bust the 9 most common assumptions and myths about file-based threats *Uncover the latest evasion trends and detect stealthy delivery methods *Prevent patient zero infections and zero-day security events from unknown files
-
12 essential features of advanced endpoint security tools
By: TechTarget ComputerWeekly.com
Type: eGuide
Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.
-
Pegasus Ataca de Nuevo
By:
Type: Replay
Sin duda habrás visto en las noticias y en las redes sociales que el avanzado software espía para móviles Pegasus (descubierto por primera vez por Lookout y The Citizen Lab en 2016) ha sido utilizado recientemente contra el Presidente del Gobierno y la Ministra de Defensa entre otros cargos públicos en nuestro país. Únete a nuestro seminario web sobre PEGASUS donde te contaremos: - ¿Qué es el grupo NSO? - ¿Qué es Pegasus y qué capacidades tiene? - Cómo ha evolucionado Pegasus desde 2016 - ¿Cuál es el impacto en los individuos y las empresas? - Cuales son nuestras recomendaciones para protegerte de PEGASUS y otros Spywares Ponentes Daniel Villaseñor, Cybersecurity Sales Engineer, Lookout Justin Albrecht, Security Intelligence Research, Lookout Javier Gomez Berruezo, Account Manager, Lookout
-
A Computer Weekly buyer's guide to SIEM and SOAR
By: TechTarget ComputerWeekly.com
Type: eGuide
The question of how to use data has big implications on a company's performance. In this 16-page buyer's guide, Computer Weekly looks at how SIEM and SOAR tools assist IT teams, why security tools require strong internal security processes to work effectively and what role they have in a rapidly changing cyber threat landscape.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Making the case for cloud-based security
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
-
Infographic: 5 essential open source cybersecurity tools for 2022
By: TechTarget ComputerWeekly.com
Type: Infographic
There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
-
How complacency kills mobile security
By: Lookout
Type: eGuide
In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
-
Your expert guide to endpoint security
By: Carbon Black
Type: eGuide
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
-
Why zero trust is IT security's best hope
By: TechTarget ComputerWeekly.com
Type: eGuide
This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.
-
Computer Weekly Buyer's Guide to EU General Data Protection Regulation
By: TechTarget ComputerWeekly.com
Type: eBook
In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
By: TechTarget ComputerWeekly.com
Type: eGuide
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
Infographic: SIEM vs. SOAR vs. XDR
By: TechTarget ComputerWeekly.com
Type: Infographic
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
-
Myth vs. reality: Persistent threats hijacking your internet connection
By: Dimension Data
Type: eGuide
In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
By: TechTarget ComputerWeekly.com
Type: eGuide
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Cyber security in the Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
-
Trust no one: Why zero trust security is taking the world by storm
By: TechTarget ComputerWeekly.com
Type: eGuide
As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
-
How to improve your cloud DLP
By: Symantec & Blue Coat Systems
Type: eGuide
This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
-
Australia's cybersecurity game plan
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
Infosec culture: A former helicopter pilot's perspective
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
13 steps for enabling secure remote work
By: TechTarget ComputerWeekly.com
Type: Infographic
Remote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
-
How Remote Connectivity Platforms Enable Secure Business Operations
By: TeamViewer
Type: Analyst Report
Download this IDC report for your roadmap on establishing secure remote connectivity for both agile and productive business operations. Inside the data-rich report, learn how to obtain a 360-degree security posture, to get the most from your connectivity platform, and to view essential guidance to get you started.
-
MicroScope – February 2021: The forecast on channel security
By: MicroScope
Type: Ezine
MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
-
Containers: Making security and business sense
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
-
Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
-
CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
By: TechTarget ComputerWeekly.com
Type: Ezine
A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.