IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats White Papers (View All Report Types)
 
Cybersecurity 101: What Coporate Boards Should be Doing
sponsored by Trend Micro
WHITE PAPER: Download and discover how executives can start making a significant impact on enterprise cybersecurity, ensuring that valuable enterprise data is safe from hackers.
Posted: 26 May 2015 | Published: 26 Sep 2014

Trend Micro

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by Threat Track Security
WHITE PAPER: This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
Posted: 21 May 2015 | Published: 29 Apr 2015

Threat Track Security

Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 07 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015


Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the anatomy of an attack and why preventative measures inevitably fail. Read on to learn how a two-factor authentication strategy limits the usefulness of any credentials that a hacker may have acquired or created.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 21 May 2015 | Published: 13 May 2015

Neustar®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement