IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
 
Are You Risking Security With the Cloud?
sponsored by IBM
WHITE PAPER: This e-book will help you learn more about the techniques that are being employed to attack cloud environments.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER: This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014

SafeNet, Inc.

Protect Your Fleet With Simple, Policy-Based Print Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Top 5 Vulnerability Management Mistakes
sponsored by Risk IO
WEBCAST: Download this important webcast now to learn about the top five most common vulnerability management mistakes.
Posted: 23 Jan 2015 | Premiered: Jan 23, 2015

Risk IO

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Printing Security: The ‘Forgotten Link’ in Operational Excellence
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper covers the top 10 rules for effective printer security.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited

Best Practices to Secure your Virtual App & Desktop Solutions
sponsored by Citrix
WEBCAST: This exclusive webcast will detail how you can keep your virtual applications and desktop solutions safe.
Posted: 27 Jan 2015 | Premiered: Oct 14, 2014

Citrix

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement