All resources sponsored by:

FireEye

1 - 25 of 40 Matches
Top Three Tactics Advanced Attackers Use to Breach Pharmaceutical Organizations
sponsored by FireEye
WHITE PAPER:This essential white paper breaks down the top three most dangerous methods malicious attackers employ and evaluates strategies that can safeguard your sensitive data against them.
Posted: 08 Aug 2014 | Published: 08 Aug 2014
Get This Now


The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER:This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014
Get This Now


Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER:This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014
Get This Now


A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER:This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014
Get This Now


Beyond the Breach
sponsored by FireEye
WHITE PAPER:This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014
Get This Now


Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER:This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
Get This Now


DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER:This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014
Get This Now


SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER:Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014
Get This Now


Debunking the Myth of Sandbox Security
sponsored by FireEye
WHITE PAPER:This guide debunks the myth of effective sandbox security and outlines inefficiencies within this popular strategy.
Posted: 06 Mar 2014 | Published: 31 Dec 2013
Get This Now


World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Defend Against Today's New Breed of Email-based Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores how email-based cyber-attacks aim to circumvent your security tools and steal your valuable business data, and how to best safeguard yourself against them.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER:This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Hot Knives Through Butter: Evading File-Based Sandboxes
sponsored by FireEye
WHITE PAPER:This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.
Posted: 04 Mar 2014 | Published: 28 Feb 2014
Get This Now


The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:In today's evolving threat landscape, organizations of allsectors and sizes are falling victim to increasingly sophisticated cyber-attacks. This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Big Threats for Small Businesses
sponsored by FireEye
WHITE PAPER:Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER:This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER:In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013
Get This Now


From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
Get This Now


The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks
sponsored by FireEye
WHITE PAPER:The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
Get This Now


Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
Get This Now


Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER:In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014
Get This Now


How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013
Get This Now


1 - 25 of 40 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement