Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
 
Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

modusCloud Email Security URL Defense
sponsored by Vircom
RESOURCE: Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Vircom

How to Block Malicious File Uploads
sponsored by OPSWAT inc
WHITE PAPER: File uploads offer an attack vector to cybercriminals. This white paper describes the best ways to prevent malicious file uploads and the keys to protecting your sensitive data.
Posted: 29 Aug 2017 | Published: 29 Aug 2017


IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Secure Your VDI If You Don't Wanna Cry Again
sponsored by Citrix Ready
WHITE PAPER: Virtual desktop infrastructures (VDIs) are a popular option for those looking to connect and work with their data from anywhere in the world. It would be easy enough for WannaCry to piggyback its way into your system. This upcoming webcast will teach you how to protect your virtualized environment and key best practices for doing so.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Citrix Ready

Unknown Threat Detection Platform
sponsored by OPSWAT inc
WEBCAST: Protecting potentially harmful code is essential when securing your data. Watch this webcast to uncover how to block unknown threats and detect outbreaks.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Endpoint Security Review: Cb Defense
sponsored by Carbon Black
PRODUCT REVIEW: Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.
Posted: 11 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Digital Signing and Verification is Paramount in Cross Domain Environments
sponsored by OPSWAT inc
WEBCAST: Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement