Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious CodeReports
 
Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: In this in-depth eBook, gain critical insights into how organizations are targeted by advanced threats, and how your endpoints, servers, and other devices can function as entrances into your network for cyber criminals.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Avoid Disastrous Data Breaches with New Security Solutions
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

How SMBs can stop Malvertising
sponsored by Dell Software
WHITE PAPER: Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement