Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Threats Reports
 
Continuous Monitoring: A New Approach to Proactively Protecting your Global Perimeter
sponsored by Qualys
WHITE PAPER: This white paper examines the need for continuous monitoring. Access now to explore a blueprint to improving your network security strategy and how to identify and address potential threats enabled by vulnerabilities in software or systems.
Posted: 21 Apr 2015 | Published: 13 Aug 2014

Qualys

Layered Cyber Defenses for Better Security
sponsored by Hewlett-Packard Company
WHITE PAPER: View this webcast to learn how to evolve your cyber security strategy into a four phase process to stop APT attacks. Read on now to learn the 12 critical capabilities of an adaptive protection process and how to move beyond a reactive architecture to an always-on monitoring model.
Posted: 22 Apr 2015 | Published: 04 Jun 2014

Hewlett-Packard Company

Cybercrime's Underground Economy
sponsored by Neustar®
WEBCAST: This webcast explores the underground criminal world of cybercrime, uncovering its different roles and giving you the rare chance to watch some of these illegal transactions live.
Posted: 18 Feb 2015 | Premiered: Jan 31, 2015

Neustar®

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webcast, discover the six key steps you need to take to optimize your SIEM use.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement