Software  >  

Malicious Threats

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Threats Reports
 
API Security Checklist
sponsored by Axway
WHITE PAPER: This infographic shares with you 11 ways to guard your enterprise entry points. Look it over and make the changes necessary to ensure a more secure API deployment for your business.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Axway

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame network blind spots and manually extracting and correlating data by turning to the cloud.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT: This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016

Prelert

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats.To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: This white paper shows you the latest threat intelligence trends and how your organization can better your cyber security practices. Access now to review a systematic guide to help you understand where your organization resides on the path to mature threat intelligence.
Posted: 08 Apr 2016 | Published: 01 Mar 2016

ThreatConnect

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

How Credential Phishing is Changing - How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement