EXPERT ADVICE |
When to take a bug bounty program public -- and how to do it |
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public. |
How does the OneSoftPerDay adware hide from antimalware systems? |
OneSoftPerDay, an adware program can install backdoors on PCs, is able to avoid detection from antimalware tools. Expert Nick Lewis explains how to mitigate its effects. |
Are Conficker malware infections of ICS or SCADA systems a threat? |
Conficker malware was found in a German nuclear power plant computer system. Expert Nick Lewis explains the possible impact of malware infections of ICS and SCADA systems. |
How to prevent ransomware or recover from a ransomware breach |
Ransomware, the latest malware threat with which information security professionals must grapple, is spreading, according to many authorities. This TechGuide explores the nature of the threat and the latest ransomware trends. But it does more than merely raise the alarm: Included in this primer on ransomware is also actionable intelligence on both ransomware prevention and recovery. It outlines several steps information security pros should take now in order to heighten their company's resistance and prevent ransomware attacks. It also guides information security pros through recovery steps if they are indeed victims of a ransomware attack. Readers of this guide will gain a deeper insight into the nature of ransomware and how it's changing and spreading. But they will also be better equipped to prevent ransomware attacks and possess crucial knowledge to guide them in the event of a ransomware attack on their corporate systems. |
Threat monitoring: Why watching the dark web is crucial |
Enterprises should broaden their threat monitoring to include dark web sites. Expert Matt Pascucci explains why it's important, and what enterprises can learn from the dark web. |
No comments:
Post a Comment