Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Threats White Papers (View All Report Types)
 
Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

Analyzing the ROI of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: While there are unquantifiable returns associated with greater cyber awareness, there are also calculable cost savings and returns. Access now to learn how you can demonstrate cost savings in a tangible way to your board members.
Posted: 12 May 2016 | Published: 01 Apr 2016

Digital Shadows

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: This white paper takes a deeper look at recent attacks on the government, Aramaco, Sony and others and breaks down what type of malware it was and how it works, measures you can take to mitigate the risk of an attack and considerations for protecting your data on file shares, endpoints and collaborative systems.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Virtualization Security Options: Choose Wisely
sponsored by Kaspersky Lab
WHITE PAPER: This white paper describes different virtualization security solution options - conventional agent-based, agentless, and Light Agent. Access now to learn possible scenarios for aligning the right security approach to your organization's virtual environment.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER: Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016

Palo Alto Networks

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement