Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software White Papers (View All Report Types)
VARs: Gain More Reliable Revenue from Endpoint Security
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based options as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015


Are Cybercriminals Hiding in Your SSL Traffic?
sponsored by Venafi
WHITE PAPER: This white paper examines how hackers can hide their exploits in encrypted SSL traffic and suggests ways you can stop them.
Posted: 10 Sep 2015 | Published: 10 Sep 2015


The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper explores how the cloud is revolutionizing endpoint security, and what that means for you and your customers.
Posted: 26 Aug 2015 | Published: 30 Nov 2014


Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Improving Web Application Firewall Security
sponsored by Akamai
WHITE PAPER: In this white paper, learn the 5 basic, yet critical, characteristics that a WAF needs to perform.View now and discover how to evaluate WAFs and go beyond the basics to defend against advanced attacks.
Posted: 04 Nov 2015 | Published: 23 Sep 2015


5 Most Common Types of Malicious Hackers
sponsored by Raytheon|Websense
WHITE PAPER: This resource examines the five most common types of hackers and reveals how each one operates.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Remove Network Traffic Blind Spots
sponsored by Radware
WHITE PAPER: In this white paper, learn how to shine a light on all network traffic shadows and dark spots to mitigate malicious programs and attacks. Continue reading to examine the 8 considerations for choosing an SSL visibility strategy.
Posted: 12 Nov 2015 | Published: 15 Apr 2015


How Insecure Keys and Certificates Can Put You at Risk
sponsored by Venafi
WHITE PAPER: This white paper describes how hackers use insecure keys and certificates to compromise a network and gives you tips on making yours more secure.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement