IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware ThreatsReports
 
The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This white paper provides 9 strategies for retail security professionals to take control of their security posture and reduce the burden of achieving and maintaining PCI compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

3 Ways That Retailers Can Address POS Security Challenges
sponsored by Bit9, Inc.
VIDEO: In this short video, learn how to address evolving malware threats and meet PCI DSS 3.0 compliance requirements with a proactive approach to security.
Posted: 15 Dec 2014 | Premiered: 07 Nov 2014

Bit9, Inc.

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

Major Digital Entertainment Business Protects Hundreds of Artist Websites with CloudPassage Halo
sponsored by CloudPassage
CASE STUDY: In this case study, learn how a major digital entertainment business protects hundreds of artist websites with software-defined security delivered in a SaaS model with cost-effective, metered-based pricing.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement