Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious CodeReports
 
Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Improve Enterprise APT Detection
sponsored by IBM
EGUIDE: This expert E-Guide explains why enterprises are turning to context-aware security approaches to improve their APT detection capabilities. Follow these tips to tackle advanced persistent threats in your organization.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

Get Ready to Halt Cyber Attacks With IPS In Place
sponsored by HP and Intel
CASE STUDY: This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

HP and Intel

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos, Inc.
ANALYST REPORT: This in-depth Gartner Magic Quadrant compares 18 vendors and their EPPs. Inside, learn about each platform's strengths and cautions, and see how each matches up on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Posted: 08 Aug 2014 | Published: 08 Jan 2014

Sophos, Inc.

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Technical Considerations for Selecting the Best Antimalware Technology
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hexis Cyber Solutions Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement