Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code White Papers (View All Report Types)
 
This is How We Do It: A Financial Giant's Threat Intel Success Story
sponsored by ThreatConnect
WHITE PAPER: This white paper tells you the story of a Fortune 100 services organization that integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified attacks before they occurred. Access now to learn how you can streamline and improve your threat intelligence program.
Posted: 04 May 2016 | Published: 01 Apr 2016

ThreatConnect

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

IBM X-Force Threat Intelligence Quarterly – Q4 2015
sponsored by IBM
WHITE PAPER: This report highlights four key trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

Forrester Report -Building_An_Effective_Breach_Detection_And_Response_Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

What You Need to Know About Vendor Risk Management in Financial Institutions
sponsored by BitSight
WHITE PAPER: This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

BitSight

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement