Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code White Papers (View All Report Types)
Securing Connected Cars Through Comprehensive Software Testing
sponsored by Synopsys
WHITE PAPER: There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle rolls into the dealership.
Posted: 13 Sep 2016 | Published: 01 Aug 2016

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Trustwave Managed Security Testing - DON’T GUESS. TEST.
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016


HII Insider Threat Report: The Threat is Already Within
sponsored by Imperva
WHITE PAPER: Discover how you can best protect your organization from insider threats through investigation and early detection tools. Learn about the 3 main classifications for insider threats and how to best mitigate them.
Posted: 20 Jul 2016 | Published: 01 Jun 2016


The Anatomy of Today's Top Cybersecurity Fields
sponsored by Unisys
WHITE PAPER: Discover detailed breakdowns of top cybersecurity fields including research and development, federal information technology governance, as well as identity and access management. Learn how to address threats, recognize associated risks, and meet ongoing challenges in the vital threat landscape.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016


Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Fight Unwanted Intrusions with Multi-Layered Security
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to make your security systems work together as one. Learn how to achieve better communication between existing security tools and stop known threats, unknown threats, APTs and prevent future breaches.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement