Software  >  

Malicious Logic

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Logic Reports
 
The Evolution of SIEM: Why it is Critical to Move Beyond Just Logs
sponsored by RSA
WHITE PAPER: Discover how you can spot advanced threats that bypass preventative controls - ones that SIEM systems simply can't see. Gain greater visibility and security context to reconstruct events and attacker TTPs (Tactics, Techniques and Procedures) to stop the attackers before they compromise your enterprise.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA

Insider Threat Spotlight Report
sponsored by Exabeam
WHITE PAPER: High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.
Posted: 10 Aug 2016 | Published: 01 Jul 2016

Exabeam

The Most Dangerous Cybersecurity Threat Might Be Sitting Next to You
sponsored by Imperva
WHITE PAPER: This infographic shows you different departments throughout your organization and the high risk actions they perform every day. Whether they be malicious users, compromised users or just careless users, it's possible your own employees are the biggest threat to your data security right now.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Imperva

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be in 2016. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence
sponsored by Imperva
WHITE PAPER: Now is the time to move toward people-centric and pervasive monitoring strategies to future-proof your organization. Read this report by Gartner to discover 4 critical shifts organizations need to implement to stay vigilant.
Posted: 19 Jul 2016 | Published: 01 May 2013

Imperva

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

Ransomware: Profitable for Criminals, Hard to Stop for Enterprises
sponsored by ExtraHop
ANALYST REPORT: Can your traditional approaches to security keep up with the bad guys? Learn a more behavior-based approach to detecting ransomware. Discover how this security strategy can grant you better visibility into your environment so you can determine where malware is and where it's been.
Posted: 14 Jul 2016 | Published: 15 Jun 2016

ExtraHop

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement