Software  >  

Malicious Software

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Software Reports
 
How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WHITE PAPER: This webinar transcript discusses how you can better manage your vulnerabilities and effectively detect zero-day malware.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This infographic gives you a quick breakdown of just how prevalent cyber breaches are and how much danger your organization may be in.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

IBM

Network Security: Defending Known and Unknown Attacks in 3 Steps
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple, three-phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


An Inside View of a Zero-Day Attack
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper gives an inside look at the lifecyle of zero-day exploit, tracking its progress from initial attack to ultimate remediation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Powerful Anti-Malware for Your Mobile Device
sponsored by Malwarebytes Corporation
WHITE PAPER: Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.
Posted: 07 May 2015 | Published: 07 May 2015


Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.
Posted: 10 Jul 2015 | Published: 31 May 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement