Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer Code Reports
How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

Cybersecurity Strategy Needs to be More Dynamic
sponsored by Unisys
EGUIDE: This expert e-guide explores app vulnerabilities and security strategy shortcomings and how you can fill in the gaps and adjust your approach to adapt to the changing threat landscape. View now to learn why a walled network will enable more data breaches to succeed and how to take a more holistic view of cybersecurity.
Posted: 20 Nov 2015 | Published: 18 Nov 2015


5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper for in-depth reviews of some of the top SIEM vendors and to determine is SIEM is the right choice for you.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Improving Threat Response and Mitigation is a Critical Best Practice
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to centralize attack visualizaiton and mitigation management and supplement and correlate internal data feeds with external intelligence to provide context to threats.
Posted: 04 Nov 2015 | Published: 17 Jun 2015

Proofpoint, Inc.

6 Key Security Transformations for Protecting Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper examines the six areas of cybersecurity that most need to transform if your business is going to stay secure in today's threat environment.
Posted: 03 Nov 2015 | Published: 30 Sep 2015


Next Generation Threat Defense: Malware Breaks Past Perimeters
sponsored by Trend Micro
WEBCAST: In this thrilling webcast, watch the drama unfold as one organization relies too heavily on fossil network security measures and falls victim to a data breach despite taking all of the necessary remediation steps such as log audits and sandboxing. View now to learn the strategies to bolster network security and how to rethink your architecture.
Posted: 01 Oct 2015 | Premiered: Sep 2, 2015

Trend Micro

Case Study: Reducing Security Costs without Reducing Security
sponsored by Imperva
WHITE PAPER: This case study tells the story of a technology company that replaced its advanced but costly security system with one that provided the same amount of protection for a much lower price.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Inside the Wire: Why Perimeter-centric Monitoring Leaves You Vulnerable
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover how to gain east-west visibility into your network to uncover hidden advanced threats. Continue reading to learn how to detect malicious activity before it hits your valuable data.
Posted: 02 Oct 2015 | Published: 17 Jun 2015

Trend Micro
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement