Software  >  

Malicious Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Code Reports
 
An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015


An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.
Posted: 06 May 2015 | Published: 06 May 2015


5 Steps to Designing a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.
Posted: 26 Mar 2015 | Published: 20 Oct 2014

Juniper Networks, Inc.

Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Top 10 Firewall Shopping Checklist
sponsored by Juniper Networks, Inc.
RESOURCE: In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.
Posted: 11 May 2015 | Published: 06 May 2015

Juniper Networks, Inc.

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Fighting Today's Advanced Attacks and Defending Your Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

What to Do When Your Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement