Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious CodeReports
 
Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Cisco Systems, Inc.

Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

Expert Guide to Secure Web Gateways
sponsored by TechTarget
RESOURCE: Secure web gateways are becoming more prominent amongst many organizations, but understanding how to implement it into your infrastructure is imperative for optimal performance. Participate in this survey and gain access to this expert guide providing deeper insight into different feature options into how to circumvent deployment challenges.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Return to Sender: Improving Email Security with DMARC
sponsored by Imperva
EGUIDE: Learn how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security in this expert e-guide.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Imperva

Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them
sponsored by FireEye
WHITE PAPER: This guide explores how email-based cyber-attacks aim to subvert your security tools and steal your valuable business data.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Information Risk: Managing Digital Assets in a new Technology Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Limited

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement