Software  >  

Joke Programs

RSS Feed    Add to Google    Add to My Yahoo!
Joke Programs Reports
Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

New Buyers of SSL Certificates FAQs
sponsored by Symantec Corporation
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Corporation

Special Report: Best Practices for Incident Response
sponsored by Intel Security
WHITE PAPER: The SANS 2015 Incident Response survey results reveals an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Intel Security

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This white paper breaks down the 20 critical security controls developed by SANS, discussing how you can best follow them.
Posted: 16 Oct 2015 | Published: 31 Mar 2013


The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012


Research Report: Attack Detection and Incident Response
sponsored by Intel Security
WHITE PAPER: This report examines organizations' security strategies, cyber-attack environments, and IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills, and poor security analytics capabilities.
Posted: 20 Oct 2015 | Published: 30 Apr 2015

Intel Security

Improving Threat Response and Mitigation is a Critical Best Practice
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to centralize attack visualizaiton and mitigation management and supplement and correlate internal data feeds with external intelligence to provide context to threats.
Posted: 04 Nov 2015 | Published: 17 Jun 2015

Proofpoint, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement