Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyber-warfare

RSS Feed    Add to Google    Add to My Yahoo!
Cyber-warfareWhite Papers (View All Report Types)
 
Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them
sponsored by Dell and Microsoft
WHITE PAPER: This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.
Posted: 26 Mar 2014 | Published: 01 Oct 2013

Dell and Microsoft

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

Tracked, Hacked and Attacked
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare
sponsored by McAfee, Inc.
WHITE PAPER: Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often.
Posted: 08 Dec 2009 | Published: 07 Dec 2009

McAfee, Inc.

Antivirus Testing and AMTSO Has anything changed?
sponsored by ESET
WHITE PAPER: This paper looks at testing as it was, as it is, and as Anti-Malware Testing Standards Organization (AMTSO) would like it to be. Is testing really so difficult? Is it appropriate for the vendors who make the products under test to be so involved in the process of defining good practice?
Posted: 08 Sep 2010 | Published: 08 Sep 2010

ESET

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
sponsored by ArcSight, an HP Company
WHITE PAPER: This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

The Next Generation of Cybercrime: How it's evolved, where it's going
sponsored by Dell, Inc.
WHITE PAPER: Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Posted: 19 May 2011 | Published: 19 May 2011

Dell, Inc.

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement