Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware White Papers (View All Report Types)
Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

A Guide to Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016


Building an Information Fortress
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Discover how to reinvent your security infrastructure into an information fortress. Learn three key steps to improve the security surrounding your enterprise and learn to protect your information at the source.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Oracle Corporation UK Ltd

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advanced algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015


Answering 10 Essential Questions About Website Security
sponsored by Symantec
WHITE PAPER: Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.
Posted: 28 Sep 2016 | Published: 28 Sep 2016


Leverage Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: Discover a real-time web protection strategy that can target modern malware threats. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016


Cybersecurity Poverty Index
sponsored by RSA Softcat
WHITE PAPER: Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

DDoS: A Clear and Present Danger
sponsored by A10 Networks
WHITE PAPER: Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Why You Need to Test All Your Cloud, Mobile and Web Applications
sponsored by Trustwave
WHITE PAPER: Uncover the importance of complete application testing and find recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.
Posted: 18 Oct 2016 | Published: 31 Dec 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement