Software  >  

Malicious Logic

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Logic White Papers (View All Report Types)
Improving Threat Response and Mitigation is a Critical Best Practice
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to centralize attack visualizaiton and mitigation management and supplement and correlate internal data feeds with external intelligence to provide context to threats.
Posted: 04 Nov 2015 | Published: 17 Jun 2015

Proofpoint, Inc.

10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Is Your Organization Cyber Resilient?
sponsored by MASERGY
WHITE PAPER: This blog post introduces the World Economic Forum's Cyber-Resilience Framework and explains how it can help you find the points of strength and weakness in your organization's cybersecurity.
Posted: 16 Sep 2015 | Published: 13 Aug 2015


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015


Special Report: Incident Response Capabilities Needed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The SANS 2015 survey of the incident response capabilities found both good news and bad news. Read on to discover what the survey found and what those results mean for your organization.
Posted: 24 Nov 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Special Report: Threat Intelligence in Late 2015
sponsored by IBM
WHITE PAPER: This quarterly threat intelligence reveals the newest developments in cybercrime, helping you to stay secure against today's most dangerous threats.
Posted: 13 Oct 2015 | Published: 31 Aug 2015


Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper for in-depth reviews of some of the top SIEM vendors and to determine is SIEM is the right choice for you.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 12 Nov 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement