IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats White Papers (View All Report Types)
Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Why Online Trust is at the Breaking Point
sponsored by Venafi
WHITE PAPER: This infographic breaks down the danger that cryptographic keys and digital certificates are in, giving you essential statistics on the threats they pose to your organization.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Infographic: Is Your Data Classified?
sponsored by Identity Finder, LLC
WHITE PAPER: In a world where classifying your sensitive data prevents and reduces risk for 75% of breach events, it's in your best interest to be prepared. Access this infographic and learn methods for tackling classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

The Economy of Security
sponsored by IBM
WHITE PAPER: Explore a simple 3 step strategy to keeping informed with cybercriminal activity and protecting your organization from becoming the next data breach headline. View now and learn how to block attacks before they break through.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Improving Your Web Security Intelligence by Contextualizing Data
sponsored by Akamai
WHITE PAPER: This white paper highlights the key components missing from your web security intelligence strategy. Learn how to secure your apps, web tools, and critical business information against a myriad of attacks and develop a holistic web security strategy.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 12 Nov 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise

What's New in Unified Communications
sponsored by Dell Software
WHITE PAPER: Whether you're motivated by curiosity or talking points, this guide will help you find the information you need to stay up-to-date on important features and enhancements in the unified communications market.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Dell Software

October 2015: DDoS Attacks & Protection Report: North America & EMEA
sponsored by Neustar┬«
WHITE PAPER: This white paper examines DDoS attacks within the last 6 months and reveals key information to learn how to protect your network against determined cybercriminals. View now to learn why you should worry more about low-and-slow attacks rather than a tidal wave DDoS attack.
Posted: 12 Oct 2015 | Published: 29 Sep 2015


Vendor Comparison: Choose the Right DDoS Service Provider
sponsored by Akamai
WHITE PAPER: This Forrester report examines nine of the most significant offerings in the DDoS protection market, giving you insight into the strengths and weaknesses of each one.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Boost Protection Against Targeted Attacks with Sandboxing
sponsored by Trend Micro
WHITE PAPER: In this white paper, examine how sandboxing uncovers these hidden malware attacks by executing them in a secure and isolated environment.
Posted: 29 Sep 2015 | Published: 26 Aug 2015

Trend Micro
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement