Malware

In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware.

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • White Papers // Aug 2014

    Managing the Complexity of Today's Hybrid IT Environments

    There are many factors driving the complexity of IT today, each making it harder for organizations to get their hands around IT. As a result IT managers, need new ways to effectively manage and secure their environment and ensure IT service and business success. Read this whitepaper to...

    Sponsored By Kaseya

  • White Papers // Apr 2014

    Strategy Considerations for Building a Security Operations Center

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).

    Sponsored By IBM

  • White Papers // Feb 2014

    2013 Cost of Cyber Crime Study: Global Report

    In all countries, business disruptions and information loss or theft are the most significant consequence of a cyber attack. Organizations need to be more vigilant in protecting their most sensitive and confidential information. This report by the Ponemon Institute is based on a representative sample of 234 organizations in the...

    Provided By HP US

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • White Papers // May 2013

    A Model for Identifying Phishing E-Mail Based on Structural Properties

    The widespread use of email caused the number of warnings being made about the dark side the authors' technological revolution to increase and they are becoming uniquely vulnerable to many mysterious and malicious threats. Viruses, worms, and other forms of malicious software started targeting their email inboxes to propagate. Spam...

    Provided By C.V.Raman Group of Institution

  • eBooks // Jan 2014

    Advanced Evasion Techniques for Dummies

    This book provides an overview of network security in general and explains how cybercriminals can use hidden and mostly undetectable methods to penetrate network systems. You don't have to be a Security Expert to understand how Advanced Evasion Techniques will break the security protection model most businesses are using...

    Provided By White AU: McAfee/Intel

  • White Papers // Oct 2014

    Free Webinar - Turn the Tables on Cyber-Attacks

    Every day organisations – just like yours – fall victim to data theft through advanced targeted attacks. The costs of data breaches and remediation are extremely high. What if you could turn the tables on cyber-attacks by allowing your products to operate as one, exchanging and acting on collective threat...

    Provided By White AU: McAfee/Intel

  • White Papers // Feb 2014

    Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions At a time when IT budgets are coming under closer scrutiny, CISOs are being called upon to justify SSA investments from a cost-benefit perspective. For CISOs, the thrust of this study is clear: Software security solutions are providing substantial operational...

    Provided By HP US

  • Case Studies // Nov 2013

    IDC Customer Spotlight: HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction

    Read about how the performance, scalability, and flexibility of HP ArcSight ESM enabled Finansbank to develop a custom fraud management platform more quickly than integrating commercial fraud management platforms. This has vastly increased visibility into transaction activity across an expanded range of channels, and at the same time dramatically reducing...

    Provided By HP US

  • White Papers // Nov 2013

    Secure Singapore Banking: HP Security solutions for TRM guidelines

    The Monetary Authority of Singapore (MAS) is Singapore's central bank. MAS published the Internet Banking Technology Risk Management (IBTRM) guidelines to provide financial institutions with a framework for risk management and security best practices. TRM requires a comprehensive security program that includes systems, processes, and governance within a technology...

    Provided By HP US

  • White Papers // Nov 2013

    Managing FSI Technology Risk

    This paper looks at the issues faced by financial services firms in managing risk and compliance in their information technology (IT) systems. It illustrates the importance of a holistic security approach constructed on a comprehensive and integrated IT management framework. HP Software can help you put in place such a...

    Provided By HP US

  • White Papers // Nov 2013

    Mobility in financial services enabling new revenue streams

    This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.

    Provided By HP US

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a Better Way.

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter: The Evolution of Network Security

    An enterprise's most basic assets (employees, applications and data) are becoming increasingly flexible and independent from traditional notions of location and hardware. Unfortunately, the same is not true of enterprise security, which remains anchored to the physical perimeter of the enterprise. These shifts present a serious challenge for enterprise...

    Provided By Palo Alto Networks

  • White Papers // Nov 2013

    Hot Knives Through Butter: Evading File-based Sandboxes

    Sandboxes provide isolated, virtual environments that monitor the actual behavior of files as they execute. In theory, this setup enables security professionals to spot malicious code that evades traditional signature-based defenses. But sandboxes are only as good as the analysis that surrounds them. By themselves, sandboxes can only monitor...

    Provided By FireEye

  • White Papers // Nov 2013

    Poison Ivy: Assessing Damage and Extracting Intelligence

    This report spotlights Poison Ivy (PIVY), a Remote Access Tool (RAT) that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Poison Ivy has been used in several high-profile malware campaigns, most notoriously, the 2011 compromise of RSA SecurID...

    Provided By FireEye

  • White Papers // Nov 2013

    The New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them

    As security teams look to shore up their organization's vulnerabilities, email represents a critical attack vector to address. Through highly targeted email attacks known as spear phishing, attackers are consistently compromising the security defenses in place, proving the need for a next-generation threat protection platform. FireEye research indicates that,...

    Provided By FireEye

  • White Papers // Nov 2013

    World War C: Combatting Nation-State Cyber Attacks

    Cyberspace is now a full-blown war zone as global governments race to assert their supremacy on a new shadowy frontline. In this new war, battles are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. And the list of casualties - which already...

    Provided By FireEye

  • Case Studies // Nov 2013

    SANS WhatWorks in Detecting and Blocking Advanced Threats

    A Real Case Study at a Large Research Organization In an interview with SANS Director of Emerging Technologies John Pescatore, a veteran cybersecurity practitioner discusses how his team address the challenge of balancing high risk activities with effective cybersecurity operations. Read the interview now for insight into how your organization...

    Provided By FireEye

  • White Papers // Nov 2013

    Less Secure Than You Think

    This white paper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced targeted attacks have been extremely effective at breaking through traditional network security and enabling the...

    Provided By FireEye

  • White Papers // Nov 2013

    Supply Chain Analysis: From Quartermaster to SunshopFireEye Labs

    Many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure - a finding that suggests some targets are facing a more organized menace than they realize. This report examines 11 advanced persistent threat (APT) campaigns targeting a...

    Provided By FireEye

  • White Papers // Dec 2013

    Debunking the Myth of Sandbox Security

    Aware that their backward-facing defenses fall short, several IT security vendors are touting their sandbox products. But rather than adopting a truly fresh approach, most are merely grafting a sandbox onto their legacy strategies, which routinely fail to catch these attacks. While sandboxing advances the signature-based approach of the past,...

    Provided By FireEye

  • White Papers // Dec 2013

    Securing Cloud-Based Email: A Guide for Government Agencies

    Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security gaps. The paper reveals how by inspecting...

    Provided By FireEye

  • White Papers // Jul 2013

    Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks - A Guide for CIOs, CFOs, and CISOs

    Enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines. 95% of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common....

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • White Papers // Nov 2013

    The Advanced Cyber Attack Landscape

    Recent reports have pinpointed China as a key driver behind cyber attacks designed to steal intellectual property and other sensitive information. But advanced cyber attacks are not confined to just one nation. Rather, cyber attacks are a widespread global activity. During the course of 2012, FireEye monitored more than...

    Provided By FireEye

  • White Papers // Nov 2013

    Seven Clues To Identifying Who Is Behind Advanced Cyber Attacks

    In today's cyber threat landscape, identifying your enemy is a crucial piece of any defense plan. Finding out who your attackers are, how they work, and what they want is critical to protecting your data and intellectual property. Fortunately, breached computer systems, like any crime scene, contain a trail...

    Provided By FireEye

  • White Papers // Jan 2014

    Cloud-Based Mobile Device Security Streamlines Data Protection

    As smartphones and tablets have become increasingly sophisticated, the amount and types of data stored on them have increased. Confidential data once stored inside the firewall now resides on mobile devices, but many small and medium businesses have not taken sufficient action to address the risks this presents. SMB IT...

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile Apps

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Jan 2014

    CryptoLocker - Your Money or Your Life

    CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Publishing Exchange Server with Barracuda’s Application Delivery Controller

    Making Microsoft Exchange Server available for remote access by web, mobile, and rich clients requires a comprehensive approach to application security. With the right solution, you can implement a powerful alternative to protect critical communications infrastructure, and simultaneously help users be more productive from web clients, remote PCs, and mobile...

    Provided By Barracuda Networks

  • White Papers // Aug 2013

    Combating Small Business Security Threats: How SMBs Can Fight Cybercrime

    When hackers breach the defences of huge organizations like Amazon, Apple, or Citibank, it makes the news. When the same cybercrime exploits hit small and medium businesses (SMBs), it rarely garners a mention, but that that doesn't mean small businesses don't get hacked, or that the impact on SMBs is...

    Provided By McAfee

  • White Papers // Aug 2013

    Modernizing Security for the Small and Mid-Sized Business - Recommendations for 2013

    As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure - and struggle at times with the additional complexities that come along with it - they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Read...

    Provided By McAfee

  • White Papers // Aug 2013

    SMB is the New Cybercrime Target

    Did you know that as many as 45% of Australian SMBs experienced a targeted electronic attack in the past 12 months? Small businesses are now big targets for worldwide cybercrime. You need a comprehensive yet easy-to-manage security strategy that can protect your business while you focus on growing it.

    Provided By McAfee

  • White Papers // Aug 2013

    Verizon Data Breach Investigations Report - 2013

    Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore. This executive...

    Provided By McAfee