Whitepaper-Archiv

Neueste Themen:

Spear Phishing: Top Threats and Trends

Cybercriminals are constantly refining their tactics and making their attacks more complicated and difficult to detect. In this in-depth report, Barracuda researchers share their insights on the most recent trends in social eng...

eBook anzeigen

Bezahlen Sie kein Lösegeld

Einfach ausgedrückt: Ransomware ist eine bösartige Software, die Ihre Daten entweder verschlüsselt oder Sie anderweitig daran hindert, auf Ihre eigenen Systeme zuzugreifen. Die Kriminellen verlangen anschließend Lösegeld im Aus...

eBook anzeigen

Don’t pay the ransom

In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems. The criminals then demand a ransom in exchange for the decryption key, although, of course...

eBook anzeigen

Das neue ABC der Anwendungssicherheit

Anwendungen sind die Bausteine für die Abläufe digitaler Unternehmen und ihrer Interaktionen mit ihren Endbenutzern und Kunden. Der Umstieg auf externes Arbeiten im Jahr 2020 hat die Bedeutung von Web-Apps erhöht, und viele Unt...

eBook anzeigen

The new ABCs of application security

Applications are the building blocks of how digital businesses work and how they engage with their end users and customers. The move to remote work in 2020 intensified the importance of web apps, and many organizations have had...

eBook anzeigen

Reale Struktursimulation

MSC Nastran – Das Original In diesem eBook werden Herausforderungen beschrieben, die Anwender mit Hilfe von MSC Nastran, einer Simulationslösung von Hexagon, gemeistert haben. Die folgenden Anwenderberichte zeigen, wie multidi...

eBook anzeigen

The CIO Roadmap to Hybrid and Multi-Cloud

While cloud has become a key driver of business expansion and operational efficiency, business and IT leaders still struggle to understand how to transform their organizations into cloud-driven and cloud-optimized enterprises. ...

Whitepaper anzeigen

3 Things That Slow Your Time to Remediation

Today’s average security team has to manually collect findings from 5 to 10 disparate scanning tools and try to deduplicate and prioritize them. Since the security team cannot fix these risks, it has to act as a “middleman” an...

eBook anzeigen

451 - The Value of Streamlining Cloud Native Operations & Optimizing Public Cloud Environments

A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in ...

Bericht anzeigen

The Seven Cybersecurity Misconceptions Every CIO should Dispel

Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are oft...

eBook anzeigen
NEWSLETTERFür unseren Newsletter registrieren
Die wichtigsten Nachrichten kostenlos per E-Mail