Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
 
Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali

Top 10 Zero-Day Exploits of 2015
sponsored by Palo Alto Networks
WHITE PAPER: This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.
Posted: 30 Jun 2016 | Published: 01 May 2016

Palo Alto Networks

Best Practices for Monitoring Today's Murky Threat Environment
sponsored by Hewlett Packard Enterprise
EGUIDE: In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security

Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: This report shows you the security performance results of 250 organizations per country from the U.S., the U.K., Singapore, Germany, China and Brazil during May 2015 until May 2016. Discover how to help your organization's security stance as you move forward into new, global markets.
Posted: 28 Jun 2016 | Published: 01 May 2016

BitSight

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Timeline of Disruption- A history of disrupting the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn about the history of enterprise security: from its conception until today. See how hacking has disrupted business innovation over the years and understand why your organization must continue to innovate fearlessly.
Posted: 15 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE: Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement