Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware Reports
 
Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

APTs: Why the Best Defense is a Full Spectrum Offense
sponsored by Zscaler
WHITE PAPER: This white paper provides answers to all of your questions about advanced persistent threats, from the APT lifecycle to the best ways to evaluate potential APT defense solutions.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement