Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
Email Security Guide: 7 Critical Capabilities of Email Gateways
sponsored by LogicNow
WHITE PAPER: This white paper presents the 7 critical capabilities of email gateways to mitigate the top 5 email attacks.
Posted: 27 Aug 2015 | Published: 22 Jul 2015


Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

Inside the Wire: Why Perimeter-centric Monitoring Leaves You Vulnerable
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover how to gain east-west visibility into your network to uncover hidden advanced threats. Continue reading to learn how to detect malicious activity before it hits your valuable data.
Posted: 02 Oct 2015 | Published: 17 Jun 2015

Trend Micro

Cyber-Threats in 2015
sponsored by Webroot
WHITE PAPER: This white paper arms you with the most up-to-date web security knowledge that you need to keep your clients safe.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

Speed Up Incident Response and Reveal Malicious IP Sources
sponsored by OpenDNS
WHITE PAPER: This breif white paper outlines how to gain great visibility and control over network traffic to uncover sophisticated threats.
Posted: 09 Oct 2015 | Published: 30 Sep 2015


Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015


Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement