Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Information Wars

RSS Feed    Add to Google    Add to My Yahoo!
Information WarsReports
 
Fight Cyber Crime with Splunk, Cisco, and Red Hat
sponsored by Red Hat
WHITE PAPER: Consult the following brief white paper to examine the current state of cyber crime and how Splunk, Cisco, and Red Hat have come together to scale-out cyber security analytics built on affordable, industry-standard infrastructure to help thwart and predict threats.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Red Hat

Fighting Economic Crime in the Financial Services sector
sponsored by ComputerWeekly.com
IT BRIEFING: PwC examines the impact of Cybercrime on the financial services industry.
Posted: 27 Mar 2012 | Published: 26 Mar 2012

ComputerWeekly.com

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

E-Guide: Clearing Up the Confusion to Prepare for APTs
sponsored by Dell SecureWorks
EGUIDE: Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Dell SecureWorks

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement