Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by Sophos Inc

SamSam: The (Almost) Six Million Dollar Ransomware

SamSam is a very different sort of ransomware, used roughly once per day in one devastating, handcrafted attack.

White Paper | Presented by Sophos Inc

Firewall Best Practices to Block Ransomware

Read this whitepaper to learn how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the optimum protection against ransomware.

White Paper | Presented by Sophos Inc

Standing Up to Cryptojacking: Best Practices for Fighting Back

Crooks are aggressively targeting servers and even whole networks in order to mine for cryptocurrency on other people's computers. Simply put, you pay for the electricity and hardware, and they pocket the rewards.

White Paper | Presented by Sophos Inc

Synchronized Security in a Connected World

With 83% of IT managers agreeing that cyber threats are getting harder to stop, it’s time to move from point products to a connected cybersecurity system

White Paper | Presented by Sophos Inc

Endpoint Buyers Guide

This guide will provide clarity by walking you through the key preventative technologies and why you need them. It will also show you how different vendors stack up in independent tests

White Paper | Presented by Sophos Inc

Don’t Take the Bait. Phishing is big business. Don’t get hooked.

In the last year, there’s been a meteoric rise in phishing attacks as hackers continue to refine and enhance their tactics, taking advantage of malware-as-a-service offerings on the dark web.

White Paper | Presented by Sophos Inc

Exploits Explained: Comprehensive Exploit Prevention

Read this paper to learn about 23 exploit techniques that are used by cybercriminals and nation-states, and see how Sophos Intercept X stacks up.

White Paper | Presented by Sophos Inc

Malware B-Z: Inside the Threat from Blackhole to ZeroAccess

This paper provides insight into two of the most commonly used and technically capable pieces of crimeware, the Blackhole exploit kit and the ZeroAccess rootkit. We explain why these kits are so useful to the bad guys and show you how you can stop these threats from infecting your network and your users.

White Paper | Presented by Sophos Inc

The Dirty Secrets of Network Firewalls

The Dirty Secrets of Network Firewalls gives you valuable insight into the challenges facing IT managers around the globe. Get your copy today.