IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Windows Vulnerabilities White Papers (View All Report Types)
 
Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006

Verio

Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges
sponsored by Lumension
WHITE PAPER: Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Posted: 10 Jun 2008 | Published: 01 Jun 2008

Lumension

Guide: Security Explorer for SharePoint
sponsored by ScriptLogic Corporation
WHITE PAPER: With the growing emphasis on regulatory compliance requirements, the need to place strict security measures on the permissions within SharePoint has grown.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

Windows XP Migration: Protect and Secure Critical Data
sponsored by Commvault
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Commvault

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement