Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
 
Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: This white paper shows you the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Pervasive Security Across Your Extended Network
sponsored by Cisco
WHITE PAPER: This white paper simplifies the statistic of today's cybercrime environment to show how you can protect yourself.
Posted: 08 Feb 2016 | Published: 13 Jan 2016

Cisco

Community Collaboration Enables Threat Detection
sponsored by ThreatConnect
WHITE PAPER: This case study describes a collaborative threat intelligence initiative undertaken by five separate organizations. Read on to discover how this collaborative intelligence group kept each other safe.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ThreatConnect

Smart Access Policies Are Key to Protecting Organizational Secrets
sponsored by Veritas
RESOURCE CENTER: In this article, you will learn how to restrict inappropriate access from hackers, malware and seemingly innocent attempts to use data services by unauthorized users.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

Veritas

6 Keys to Eliminating SSL Blind Spots: What You Need for SSL Inspection
sponsored by A10 Networks
WHITE PAPER: It is estimated that 67 percent of Internet traffic will be encrypted by 2016, but that won't stop hackers from using it to their advantage. Learn six ways to ensure your network can stand up to malicious traffic with SSL inspection technology.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

A10 Networks

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative white paper outlines 10 best practices for successful SIEM implementation.
Posted: 01 Dec 2015 | Published: 19 Dec 2012

AccelOps Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement