Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer CodeReports
 
Symantec Intelligence Report: Internet Security Threats - September 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Imagine what the Cloud Can Do For You
sponsored by CDW Corporation
RESOURCE: Dive into this infographic that describes how the cloud can help you stay safe in the face of threats, while enhancing business productivity.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

CDW Corporation

Web Applications Under Attack: How Network Security Solutions Leave You Exposed
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls—web application firewalls and next generation firewalls—measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP).
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Imperva

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Know Your Endpoints to Prevent Security Breaches
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers how an IBM assessment can show you how secure your endpoints really are.
Posted: 11 Nov 2014 | Published: 13 Sep 2012

IBM

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement