Software  >  

Blended Threats

RSS Feed    Add to Google    Add to My Yahoo!
Blended ThreatsWhite Papers (View All Report Types)
 
A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This guide explores 10 common mistakes businesses make when planning their security strategy.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key strategies for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by Dell, Inc.
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
WHITE PAPER: This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

Five Stages of a Web Malware Attack
sponsored by Sophos, Inc.
WHITE PAPER: Access this resource to explore the 5 stages of web malware attacks, along with a checklist of what your web security solution needs in order to provide reliable, layered protection to prevent data theft.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Sophos, Inc.

Internet Security Census 2013
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement