Malware

Malware News

  • February 01, 2016 01 Feb'16

    Security attack? 2016 defenses focus on damage control

    What methods are attackers using to find vulnerabilities in corporate networks? Are these security attacks really advancing? We look at the latest hacking techniques and find out from top security researchers how malware and advanced cyberthreats are evolving. What steps can enterprises take in the coming year to bolster their threat defenses against multilayered security attacks? Our analysis lays the groundwork for 2016.

    Even with the right tools in place, sometimes a security attack triggers an emergency response. Providers of professional incident response services can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding cyberthreat. But there's a lot you need to do to get the best out of these services. We deconstruct the emergency incident response process, from scoping the problem to contact and remediation to reporting post-incident.

    We continue our Readers' Top Picks series with a look at two categories likely to be top of mind this year -- cloud security and data loss prevention. We crunch the numbers on survey respondents who indicated plans to invest in these tools in the next 12 months. We report on respondents' shortlists of potential providers, feature wish lists and key reasons for rolling out these projects. Not surprisingly, technology integration scored high among the readers polled; 70% said they are more likely to deploy DLP products if they are offered as a suite of interconnected tools.

  • January 28, 2016 28 Jan'16

    FirePower Network Threat Assessment offered via Ingram Micro

    Ingram Micro has introduced FirePower Network Threat Assessment services, the latest in a series of assessment services the distributor offers its channel partners.

  • January 14, 2016 14 Jan'16

    The 'sad state' of enterprise network architecture

    This week, bloggers explore enterprise network architecture challenges, the increasing danger of exploit kits and how best to oversee private cloud management.

  • December 18, 2015 18 Dec'15

    Compliance costs expected to rise as EU GDPR advances

    News roundup: As EU's Global Data Protection Regulation advances, businesses anticipate higher penalties and compliance costs. Also, malware roundup.

View All News

Malware Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Malware Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Malware

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Malware Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close