Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware White Papers (View All Report Types)
 
IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next £50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Best Practices for Dealing With Phishing and Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.
Posted: 12 Oct 2016 | Published: 01 Sep 2016

Barracuda Networks

Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

Malware Prevention vs. Detect and Respond
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy
sponsored by SAS
WHITE PAPER: Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

SAS

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Ransomware and Phishing: How to Avoid Falling Victim to These Threats
sponsored by Barracuda Networks
WHITE PAPER: Discover how to gain complete visibility, control and protection against malware, spyware, phishing, spear phishing and ransomware threats. Learn how to adequately secure all of your threat vectors and proactively stay ahead of the latest threats with an intelligent backend infrastructure.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

Information Security Consulting Services Report
sponsored by IBM
WHITE PAPER: This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.
Posted: 30 Aug 2016 | Published: 29 Jan 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement