Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer Code Reports
 
Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Appthority

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

HID

Deliver Complete Security for Enterprise Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Build a Defense-in-Depth Security Approach
sponsored by TrendMicro
WHITE PAPER: Discover why a multi-layered, defense-in-depth approach to security is your best option to keep your organization protected. A robust, multi-layered approach should involve a vast array of techniques sharing threat intelligence to improve detection accuracy and deliver a maximum level of protection.
Posted: 14 Nov 2016 | Published: 01 Oct 2016

TrendMicro

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement