Webcast by Topic: Malware

Resources available: 4

An Incident Response Playbook: From Monitoring to Operations

As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop incident detection and response processes that work for different situations.

How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry. The AlienVault Open Threat Exchange is different.

NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems

Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks.

A Brief History of Malware

Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites or from bots that reside on your own corporate network. Dr. Thomas Chimento of Webroot® Web Security Service will review the evolution of with specific emphasis on the directions that malware is likely to take over the next few years.

©1994-2014 Infoworld, Inc.