Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro

APT Attacks and Ways to Protect Your Network
sponsored by Proofpoint, Inc.
EGUIDE: In this expert e-guide, examine several approaches to protecting your network from APT attacks, including global threat intelligence.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY: Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015

Proofpoint, Inc.

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

Transforming Cyber Security at the University of New Brunswick
sponsored by Trend Micro
WEBCAST: In this informative webcast, David Shipley, Director of Strategic Initiatives, takes you through the challenges of university IT security strategies and how his team closed vulnerabilities at UNB.
Posted: 05 Oct 2015 | Premiered: Sep 23, 2015

Trend Micro

Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement