IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Smurfing

RSS Feed    Add to Google    Add to My Yahoo!
Smurfing Reports
 
Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Protecting the Enterprise Against Today's Distributed Denial of Service (DDoS) Attacks
sponsored by Corero Network Security
WHITE PAPER: With today’s increasing reliance on the Internet, it is of utmost importance to ensure security and uninterrupted availability in order to maintain a competitive advantage. View this resource now to explore the risks of DDoS attacks, the latest DDoS attack trends, guidelines for a DDoS defense program and more.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Corero Network Security

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Mega-DDoS Attack Prevention: How to Prepare for Larger DDoS Attacks
sponsored by F5 Networks
EGUIDE: In this e-guide, leading industry expert Brad Casey explains the mechanics behind high-bandwidth distributed denial of service (DDoS) attacks and key recommendations on how to prevent them.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement