Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Cyber-warfare

RSS Feed    Add to Google    Add to My Yahoo!
Cyber-warfareReports
 
Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Malware Security Report: Protecting Your Business, Customers and Bottom Line
sponsored by VeriSign Australia
WHITE PAPER: This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Ten Ways the IT Department Enables Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky Lab

Global Threat Trends - March 2010
sponsored by ESET
WHITE PAPER: Read this analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month, with almost 10.32% of the total, was scored by the Win32/Conficker class of threat.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

ESET

Antivirus Testing and AMTSO Has anything changed?
sponsored by ESET
WHITE PAPER: This paper looks at testing as it was, as it is, and as Anti-Malware Testing Standards Organization (AMTSO) would like it to be. Is testing really so difficult? Is it appropriate for the vendors who make the products under test to be so involved in the process of defining good practice?
Posted: 08 Sep 2010 | Published: 08 Sep 2010

ESET

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
sponsored by ArcSight, an HP Company
WHITE PAPER: This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement