IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats Reports
 
A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Dealing With the Problem of Targeted Email Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn everything you need to know about how targeted email attacks occur, and what you can do to prevent them.
Posted: 21 May 2015 | Published: 30 Jan 2015

Trend Micro

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

How To Approach Mobile Healthcare Security And Data Breaches
sponsored by Absolute Software
EGUIDE: In this expert e-guide, Reda Chouffani, industry expert and cofounder of Biz Technology Solutions, presents 7 best practices for protecting mHealth data from loss. Also inside, Don Fluckinger, Senior Content and Media Strategist at Schwartz MSL Boston, explores the aftermath of a breach.
Posted: 26 May 2015 | Published: 29 Apr 2015

Absolute Software

An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement