IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK: Examine crimeware, RAM scraping and advanced evasion techniques to learn how to defend systems, and investigate when defenses fail.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

What to Do When Your Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Infographic: What is Malvertising?
sponsored by Malwarebytes Corporation
WHITE PAPER: In this infographic, learn all you need to know about malvertising and how to stop it.
Posted: 06 May 2015 | Published: 06 May 2015


New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine what a data breach will cost your organization.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement