Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious ThreatsWhite Papers (View All Report Types)
 
Avoid Disastrous Data Breaches with New Security Solutions
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

How Malware Analysis Benefits Incident Response
sponsored by Solutionary
WHITE PAPER: In this white paper, learn why malware analysis is a critical component of incident response, and how it helps mitigate vulnerabilities exposed by malware and limits further compromise.
Posted: 04 Sep 2014 | Published: 31 May 2013

Solutionary

Defending Against Advanced Persistent Threats: Strategies for a New Era of Attacks
sponsored by CA Technologies.
WHITE PAPER: This guide takes a look at the growing risk of advanced persistent threats and what you can to prevent them.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement