Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware White Papers (View All Report Types)
 
2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

How Trend Micro Stacks Up among Endpoint Protection Vendors
sponsored by TrendMicro
WHITE PAPER: This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

BitSight

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 27 Jun 2016 | Published: 01 May 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement