Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software Reports
 
ROI for Threat Intelligence
sponsored by ThreatConnect
PRODUCT NEWS: In this article, you'll learn how to make informed decisions about the TI you are currently using or are thinking about using. These tools can be used to measure external sources, such as feeds, premium intel providers and also communities or your own intelligence created from incident response (IR) engagements, threat research, and hunting.
Posted: 30 Jun 2016 | Published: 29 Feb 2016

ThreatConnect

Breach response isn't about losing data. It's about keeping your customers.
sponsored by AllClear ID
WHITE PAPER: The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: Technology alone won't stop phishing attacks; empowering employees to prevent incidents is critical. Uncover ways to boost this level of security awareness, and help users protect themselves and the enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

What I've Learned from 5,000 Data Breaches
sponsored by AllClear ID
WHITE PAPER: Learn how to clearly communicate with customers after a data breach to ensure trust remains intact. Minimize confusion and anger by proactively preparing before a major breach occurs. Plan out how affected customers will be notified and supported throughout the entire response process, from notification, to protection, to fraud resolution.
Posted: 29 Jun 2016 | Published: 01 May 2016

AllClear ID

Internet of Things: Enterprise Risks, Platform Options to Consider
sponsored by Xively by LogMeIn
EGUIDE: The Internet of Things (IoT) increases the number of security risks businesses face, becoming a backdoor for attackers into the enterprise. Discover 7 key security risks associated with IoT and how to manage them. Plus learn how robust cloud platforms will allow IoT to reach its potential.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Xively by LogMeIn

How CISOs Tackle Insider Threat Data Protection
sponsored by Forcepoint
WEBCAST: Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies help protect you and your employees? Hear how a real-world CISO plans, implements and manages an insider threat program.
Posted: 30 Jun 2016 | Premiered: May 1, 2016

Forcepoint

IBM Security Trusteer Fraud Protection Suite solution brief
sponsored by IBM
WHITE PAPER: Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.
Posted: 21 Jun 2016 | Published: 01 May 2016

IBM

Analyze This
sponsored by SAS
WHITE PAPER: See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

Uniting the Security Community and Shifting the Economic Balance of Cyber Defense
sponsored by Carbon Black
WHITE PAPER: The security industry cannot continue to perpetuate the idea that technology alone will solve our security problems. Learn how to share attack details with colleagues outside of your own organization to benefit the entire cybersecurity community.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Total Protection for Data Loss Prevention - Solution Brief
sponsored by Intel Security
WHITE PAPER: Learn about a data-centric system that delivers data security and actionable insight about data at rest, data in motion and data in use across your entire organization. Easily identify potential threats and refine policies as needed to quickly respond to the shifting threat landscape.
Posted: 31 May 2016 | Published: 01 Apr 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement