IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
 
Cyber Security in the Era of Industrial IoT
sponsored by Bayshore Networks
EGUIDE: Discover how to define, identify, and contextualize security needs in a connected enterprise as IoT becomes a more pervasive and important facet of today's business.
Posted: 22 May 2017 | Published: 22 May 2017

Bayshore Networks

The Security Benefits of Web Proxies
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The web is central to the way we work, live, and play – and therefore it is also a focal point for cybercrime. Explore the functionality of web proxies and how you can use them to build a comprehensive defense against advanced web threats.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

Harnessing Analytics For Security Investigation
sponsored by Splunk
WEBCAST: Watch this video to learn how you can harness the power of this analytics software to easily detect anomalies in the endpoint, allowing you to mitigate ransomware before it becomes a problem.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

Protect Against WannaCry: A Ransomware "Weapon of Mass Destruction"
sponsored by arcserve
WHITE PAPER: Learn how to address your organization's vulnerability in the face of WannaCry, ensure you have real-world ransomware recovery in case of disaster, circumvent ransom demands and protect your data, and more.
Posted: 25 May 2017 | Published: 25 May 2017

arcserve

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement