Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software Reports
 
Buyer's Guide: User and Entity Behavioral Analytics
sponsored by Interset Software Inc.
WHITE PAPER: This white paper teaches you how to build useful RFI and RFPs, and prepares you for a behavioral-based security analytics purchase.
Posted: 12 Jan 2016 | Published: 09 Dec 2015

Interset Software Inc.

Is Your Team Prepared for a Data Breach?
sponsored by AllClear ID
WHITE PAPER: In this white paper, you will learn how to properly prepare for and respond to any data breaches your enterprise might experience.
Posted: 22 Jan 2016 | Published: 16 Dec 2015

AllClear ID

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Encryption's Risks, Benefits, and Roles in SSL Attacks
sponsored by Symantec Website Security
EGUIDE: In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
Posted: 10 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper infographic will show you specific instances of cybercrime around the world and against what applications were vulnerable.
Posted: 28 Jan 2016 | Published: 15 Dec 2015

Dimension Data

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: This white paper shows you the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Build a Privacy Organization to Manage Customer Data Effectively
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research walks you through how to effectively manage, organize and protect customer data.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

AllClear ID

Virtual Patching in Mixed Environments: How It Works to Protect You
sponsored by TrendMicro
WHITE PAPER: This white paper discusses virtual patching which provides the same functionality as software patches by implementing protective network controls that can shield vulnerable servers from attack.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: BitSight recently observed the networks of 30,700 companies across all industries and found 23% of organizations were using the BitTorrent protocol for peer-¬to-¬peer file sharing. In this report you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement