Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware Reports
 
Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


Sandbox and Secure Email Gateway - Security Dynamic Duo
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how SEGs are evolving to deliver additional layers of protection against hackers and how sandboxing, when used concurrently, can inspect harmful emails that reside within the grey area between white and black lists. View now to learn how to prevent APTs from reaching an end user.
Posted: 05 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Security Services: Beyond Malware and Antivirus
sponsored by AVG Technologies
WHITE PAPER: This white paper can help your MSP deliver effective and reliable security services in the modern threat landscape.
Posted: 14 May 2015 | Published: 14 May 2015

AVG Technologies

The Importance of Secure Application Development Lifecycles
sponsored by White Hat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

White Hat Security

17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


What to Do When Your Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement