IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats Reports
 
An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: Access this white paper to learn how a new generation of information rights management (IRM) solutions is eliminating complexity and cost concerns to provide persistent protection for your valuable company data.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

IntraLinks, Inc

MicroScope August: Security Update
sponsored by MicroScope
EZINE: An issue looking at how the channel can overcome the skills problems and a chance to hear from a range of leading vendors on how the security market is faring
Posted: 06 Aug 2015 | Published: 07 Aug 2015

MicroScope

Malware Defense: How to Detect and Mitigate Advance Evasion Techniques
sponsored by CrowdStrike
EGUIDE: In this e-guide, a security expert explores the evasion techniques used by advanced malware and explains how to detect and mitigate these threats.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This white paper examines the challenges of, and provides a solution for, a defense against new enterprise application threats. Read on to learn how you can reduce security risk by thwarting advanced malware.
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Keeping Your Data Safe: Protecting Corporate Information in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the challenges of securing data in the cloud. Continue reading to explore the strategies that have worked for other organizations; the issues presented by human error; and more.
Posted: 14 Aug 2015 | Published: 05 Aug 2015

Symantec Corporation

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Mobilize Your Email with Enterprise-Grade Security and Data Protection
sponsored by Citrix
WHITE PAPER: This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement