Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software White Papers (View All Report Types)
 
Endpoint application protection: Malware's worst enemy
sponsored by IBM
WHITE PAPER: The key to eliminating cybercrime is to eliminate malware. And the key to eliminating malware is to fight it head on by using endpoint application protection. Find out how to do so in the following white paper.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

What to Look for in an Advanced Malware Protection Vendor
sponsored by Cisco
WHITE PAPER: This exclusive white paper explores the capabilities you must look for in your advanced malware protection vendor.
Posted: 31 Dec 2014 | Published: 26 Nov 2014

Cisco

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Safeguarding Email from Abuse
sponsored by Message Bus
WHITE PAPER: This white paper explains how organizations can remove deployment barriers when it comes to DMARC—no long upgrade cycles or specialized project teams needed.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Message Bus

5 New Laws of Antimalware Protection Keep Up with Evolving Threats
sponsored by Cisco
WHITE PAPER: Continue on to this essential white paper now to uncover five laws of anti-malware protection that can keep you safe.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Cisco

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA
WHITE PAPER: This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement