Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious CodeWhite Papers (View All Report Types)
 
Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Check this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Dragonfly: Cyberespionage Attacks Against Energy Suppliers
sponsored by Symantec Corporation
WHITE PAPER: The following security response provides an overview of the tools and tactics used by the attackers and a timeline of their attacks. Read on to inform your company of possible malware threats.
Posted: 09 Jul 2014 | Published: 30 Jun 2014

Symantec Corporation

Best Practices Guide: Tools for Threat Intelligence and Incident Forensics
sponsored by DomainTools
WHITE PAPER: In this white paper, discover a suite of tools that can be used to identify the perpetrator of a cybercrime, build a profile of a cyber-attack, and proactively protect your data, infrastructure, and intellectual property.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement