Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious ThreatsWhite Papers (View All Report Types)
 
How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Five Things To Do After An Attack
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Dragonfly: Cyberespionage Attacks Against Energy Suppliers
sponsored by Symantec Corporation
WHITE PAPER: The following security response provides an overview of the tools and tactics used by the attackers and a timeline of their attacks. Read on to inform your company of possible malware threats.
Posted: 09 Jul 2014 | Published: 30 Jun 2014

Symantec Corporation

State of Security Operations
sponsored by Hewlett-Packard Limited
WHITE PAPER: With businesses recognising the need for further investment in cyber-defence, it is essential to figure out which tools and strategies are best for your organisation. Read now and find out more about the current state of security operations in 2014.
Posted: 13 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

Transforming Information Security: Designing State-of-the-Art Extended Team
sponsored by RSA
WHITE PAPER: This informative whitepaper explores strategies for designing a state-of-the-art security team.
Posted: 29 May 2014 | Published: 31 Dec 2013

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement