Software  >  

Malicious Logic

RSS Feed    Add to Google    Add to My Yahoo!
Malicious LogicReports
 
How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: This white paper introduces a solution that helps financial institutions mitigate the risks of even the most sophisticated malware.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

Energy Companies and Financial Services Firms Remain Vulnerable to Data-Breaching Malware
sponsored by Threat Track Security
WHITE PAPER: This exclusive whitepaper takes a look at the current threat landscape and how many businesses remain vulnerable to data-breaching malware.
Posted: 27 May 2014 | Published: 29 May 2014

Threat Track Security

F5 Secure Web Gateway Services Reference Architecture
sponsored by F5 Networks
WHITE PAPER: Discover the challenges of securing outbound access and how to avoid spear-phishing attacks within your organization.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

F5 Networks

RSA Security Operations Management (SecOps) in Action
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement