Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Threats Reports
Move Away from Traditional Cybersecurity
sponsored by BitDefender
VIDEO: This brief video gives you a glimpse at how your cybersecurity can look to the future instead of remaining stuck in the past.
Posted: 08 Oct 2015 | Premiered: 20 May 2015


Bolster your Network Defenses Against Targeted Attacks and Advanced Threats
sponsored by Trend Micro
WHITE PAPER: In this brief white paper, uncover how to enable 360-degree detection across your network and go beyond incoming and outbound traffic.
Posted: 02 Oct 2015 | Published: 07 Aug 2015

Trend Micro

Computer Manufacturer Swaps Out Guardium to Save 70% in Operating Costs
sponsored by Imperva
WHITE PAPER: One of the largest computer technology companies in the world replaced their IBM Guardium deployment with Imperva SecureSphere, to audit and protect their database environment. This case study explains how this organization switched to SecureSphere and reduced operating costs by over 70%.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015


Is Your Organization Cyber Resilient?
sponsored by MASERGY
WHITE PAPER: This blog post introduces the World Economic Forum's Cyber-Resilience Framework and explains how it can help you find the points of strength and weakness in your organization's cybersecurity.
Posted: 16 Sep 2015 | Published: 13 Aug 2015


Boost Protection Against Targeted Attacks with Sandboxing
sponsored by Trend Micro
WHITE PAPER: In this white paper, examine how sandboxing uncovers these hidden malware attacks by executing them in a secure and isolated environment.
Posted: 29 Sep 2015 | Published: 26 Aug 2015

Trend Micro

Advance the Fight Against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: When it comes to protecting yourself from advanced attacks, you can't always do it alone. This white paper discusses the benefits of adopting security services and gives advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

The State Of Endpoint Security Adoption 2014 To 2015
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this special report, Forrester presents the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.
Posted: 06 Oct 2015 | Published: 15 Oct 2014

Dell, Inc. and Intel®

Email Security Guide: 7 Critical Capabilities of Email Gateways
sponsored by LogicNow
WHITE PAPER: This white paper presents the 7 critical capabilities of email gateways to mitigate the top 5 email attacks.
Posted: 27 Aug 2015 | Published: 22 Jul 2015


Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: This paper explains how predictive security leverages big data to pre-empt mobile threats before they can do harm. See examples of how predictive security was able to thwart two destructive mobile apps.
Posted: 24 Aug 2015 | Published: 05 Aug 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement