All resources sponsored by:

FireEye

1 - 25 of 48 Matches
Security Reimagined
sponsored by FireEye
WHITE PAPER:It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 06 May 2015 | Published: 31 Dec 2014
Get This Now


Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER:In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014
Get This Now


What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER:This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014
Get This Now


Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER:It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014
Get This Now


Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER:This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014
Get This Now


Self-Assessment: Which Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER:This brief self-assessment will help you to determine what the next steps should be for your organization's security strategy.
Posted: 01 Apr 2015 | Published: 31 Dec 2014
Get This Now


Crafting the Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW:This paper provides step-by-step instructions on how to craft a clear and persuasive business case for advanced security.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014
Get This Now


Top Three Tactics Advanced Attackers Use to Breach Pharmaceutical Organizations
sponsored by FireEye
WHITE PAPER:This essential white paper breaks down the top three most dangerous methods malicious attackers employ and evaluates strategies that can safeguard your sensitive data against them.
Posted: 08 Aug 2014 | Published: 08 Aug 2014
Get This Now


Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER:In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014
Get This Now


The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER:This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014
Get This Now


Cybersecurity's Maginot Line: Why Hackers Can Sidestep Most Defenses
sponsored by FireEye
WHITE PAPER:This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014
Get This Now


Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER:This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
Get This Now


Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 10 Mar 2014 | Published: 10 Mar 2014
Get This Now


What Works in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER:In this white paper, you'll find insights from a research organization's security manager as he discusses how he found and deployed a security system that met his organization's needs.
Posted: 06 Mar 2014 | Published: 06 Mar 2014
Get This Now


Debunking the Myth of Sandbox Security
sponsored by FireEye
WHITE PAPER:This guide debunks the myth of effective sandbox security and outlines the inefficiencies in this popular strategy.
Posted: 06 Mar 2014 | Published: 31 Dec 2013
Get This Now


World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Defend Against Today's New Breed of Email-based Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores how email-based cyber-attacks aim to circumvent your security tools, and how to best safeguard yourself against them.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER:This guide examines one of the most effective and dangerous RATs, Poison Ivy (PIVY), and explains which tools and tactics you need to defend yourself against this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


Hot Knives Through Butter: Evading File-Based Sandboxes
sponsored by FireEye
WHITE PAPER:This in-depth guide explores how hackers avoid file sandboxing by using a range of evasion techniques.
Posted: 04 Mar 2014 | Published: 28 Feb 2014
Get This Now


The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER:This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014
Get This Now


Beyond the Breach
sponsored by FireEye
WHITE PAPER:This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014
Get This Now


DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER:This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014
Get This Now


How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013
Get This Now


1 - 25 of 48 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement