Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software White Papers (View All Report Types)
Ultimate Guide to Multi-Vector DDoS Protection
sponsored by A10 Networks
WHITE PAPER: This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.
Posted: 21 Oct 2016 | Published: 30 Sep 2016

A10 Networks

The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016


Ransomware: What You Need to Know
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.
Posted: 10 Aug 2016 | Published: 20 Jul 2016

Check Point Software Technologies Ltd.

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016


Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Barracuda Networks

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


A Guide to Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016


Building an Information Fortress
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Discover how to reinvent your security infrastructure into an information fortress. Learn three key steps to improve the security surrounding your enterprise and learn to protect your information at the source.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement