Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by Panda Security

Avoiding APTs: Defending Your Critical Infrastructure

Today’s cybersecurity landscape is constantly evolving, with new attacks surfacing regularly, and known attacks growing in both scope and complexity. From ransomware to cryptojacking and beyond, hackers are continuously finding access with new tactics. One area that has seen a lot of growth recently is Advanced Persistent Threats (APTs).

White Paper | Presented by Panda Security

Cyber-Security Compliance: Guide to Data Protection Regulatory Compliance

Over the last few years, new governmental, and sometimes industry-specific regulations and acts have been passed aimed at ensuring that companies and organizations store and process customers’ personal and sensitive data in an appropriate and lawful manner.

White Paper | Presented by Panda Security

No Kidnapping, No Ransom

Ransomware is still one of the most lucrative weapons in a cybercriminal’s arsenal. This kind of cybercrime encrypts the files on a computer, and blocks access to them until the required ransom is received, generally in the form of bitcoin, an untraceable virtual cryptocurrency.

White Paper | Presented by Panda Security

PandaLabs Annual Report 2018 - with Predictions for 2019

Cybercrime is an attractive and profitable business. Attackers are making use of more, and better, digital and economic resources than ever before, allowing them to develop attacks that are increasingly sophisticated.

eBook | Presented by Panda Security

Patch Management: Your Biggest Ally In The War Against Cybercrime

his eBook will walk you through the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.

White Paper | Presented by Panda Security

Securing Critical Infrastructure

Cyber-crime has been expanding consistently around the globe in recent years. The increasing connectivity and the digital transformation of society represents a double-edged sword, as they offer a channel of opportunity to criminals. Yet what happens when the networks that we see as essential to our very survival become the target of criminal activity?

White Paper | Presented by Panda Security

The Cyber-Pandemic: IT Attacks in the Healthcare Sector

Our world is more connected than ever. From TVs to refrigerators to cars, most everything in our daily lives is now a connected device, including medical equipment like pacemakers. Connected medical devices along with a network full of patient records has made the healthcare industry a top target for cybercriminals.

White Paper | Presented by Panda Security

The Hotel Hijackers

From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised. This makes the hospitality industry one of the main targets for cybercriminal activity.

White Paper | Presented by Panda Security

The Practical Security Guide To Prevent Cyber Extortion

Cyber extortion is a form of blackmail in which victims of an IT attack are forced to pay to avoid its effects. The most common type of cyber extortion is ransomware, which is so popular among cybercriminals that it’s become a billion-dollar industry.

White Paper | Presented by Panda Security

Understanding Cyber-Attacks

The frequency, sophistication and targeted nature of cyber-attacks has drastically changed the threat landscape. While most organizations have the means to detect known threats, although few of these types of attacks still occur, many still need to evolve their security practices to include detection of unknown attacks.