Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware White Papers (View All Report Types)
 
Security Operations Center: Unite People, Processes, and Technologies Across Your SOC
sponsored by ThreatConnect
WHITE PAPER: Discover how to deepen your threat intelligence, validate it, prioritize it and act on it. Bring together the people, processes, and technologies that comprise your Security Operations Center (SOC) team, and the other teams you partner with on a daily basis. Automate mundane security tasks that slow you down by leveraging tools you already have.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

What I've Learned from 5,000 Data Breaches
sponsored by AllClear ID
WHITE PAPER: As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.
Posted: 29 Jun 2016 | Published: 01 May 2016

AllClear ID

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM

S.I.R.M.: Security Incident Response Matrix
sponsored by Anomali
WHITE PAPER: This paper details the Security Incident Response Matrix (S.I.R.M.), a simple, easy to understand methodology used to help guide security operations staff in effectively triaging alerts and activity. The goal of this triage is to derive the intelligence necessary to understand the scope and threat of the activity.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Breach Response: Preparing for the Threat; Controlling the Chaos
sponsored by AllClear ID
WHITE PAPER: Examine past breaches, in this report, to learn the tangible benefits of being well-prepared for a cyberattack, and the key features of a successful incident response plan. Discover how to emerge from every data breach with an enhanced public image of responsibility and competence.
Posted: 28 Jun 2016 | Published: 01 Oct 2014

AllClear ID

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Webster Bank: Helping to stop online fraud before it happens
sponsored by IBM
WHITE PAPER: Webster Bank found what they needed by deploying an endpoint-centric fraud prevention solution. They now can protect mobile and desktop devices against malware and phishing attacks before they occur. After only 12 months of usage, 224 infections were detected and resolved, helping prevent the possibility of millions of dollars lost due to fraud.
Posted: 30 Jun 2016 | Published: 31 Dec 2014

IBM

The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one. Explore ways to implement various security measures, focus on detection, be ready for containment, and more.
Posted: 13 May 2016 | Published: 13 May 2016

LogRhythm, Inc.

Market Overview: Customer Data Breach Notification And Response Services
sponsored by AllClear ID
WHITE PAPER: A poorly handled breach notification will inflict further damage to your organization after a breach. Learn how to best reassure your customers with clear communications and appropriate sensitivity in your messages. Plus, in this Forrester market overview, compare 9 breach notification and response service providers and their services.
Posted: 28 Jun 2016 | Published: 01 May 2016

AllClear ID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement