IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


Security Certificates and Cryptographic Keys in Peril
sponsored by Venafi
EGUIDE: This expert guide discusses why security certificates and cryptographic keys can no longer be trusted and how you can stay safe from hacks that exploit them.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: This white paper describes two of the most frequently used Deep Web networks and suggests how you can stay safe from attacks that originate there.
Posted: 11 Sep 2015 | Published: 31 May 2015


The Perils of Phishing
sponsored by IBM
WHITE PAPER: This white paper provides you with essential information on how phishing attacks occur and how you can mitigate these threats.
Posted: 11 Sep 2015 | Published: 31 May 2015


Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015


Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015


Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015


Protecting Your Data in Office 365
sponsored by Elastica
WEBCAST: This webcast examines Shadow Data and the security vulnerabilities it opens for IT
Posted: 08 Sep 2015 | Premiered: Aug 12, 2015


The State of DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper discusses why traditional security solutions leave your DNS vulnerable and gives suggestions for keeping your DNS secure.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement