IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Smurfing

RSS Feed    Add to Google    Add to My Yahoo!
Smurfing Reports
 
Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how you can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

IBM

Cyber Risk Perceptions: An Industry Snapshot
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IBM

Today's Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 09 Feb 2016 | Published: 06 Oct 2015

Imperva

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement