Search Results for: %3Ca href%3D%22%22%3E%3C%2Fa%3E

   All     White Papers   Multimedia   IT Downloads 
11 - 20 of 9368 Matches Previous Page  |  Next Page
Supply Chain Analysis: From Quartermaster to Sunshop
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.

FireEye

Threat Report: Thanos Ransomware
Thanos is a ransomware-as-a-service (RaaS) that allows users to build and customize ransomware to suit their specific needs. It’s still in development, but it’s popular because of its techniques and its ability to evade anti-malware. Authors are actively adding more features using publicly available tools. Read this report for specifics about RaaS.

Cysiv

BitterAPT Revisited: The Untold Evolution of an Android Espionage Tool
A malware threat group targeting Pakistani nationals, known as Bitter, became infamous in 2016. In 2019, their campaigns had expanded to other countries in South Asia, East Asia and the Middle East. So, how have their espionage and malware tactics changed over the years? Download this in-depth report to find out.

Bitdefender

Forrester: Total Economic Impact of FlashArray FA-400 Series
Access this document for Forrester's independent evaluation of Pure Storage's latest flash array series.

Pure Storage

RPA – The Power of Automation
Robotic Process Automation (RPA) is an increasingly common business optimization strategy that allows companies to automate basic, menial processes like data entry. When properly implemented, RPA sees results that increase efficiency, decrease costs, and improve productivity. Read on to learn how you can improve your business with RPA.

UiPath

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.

IBM

2020 SonicWall Cyber Threat Report
Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.

SonicWall

Fighting Fraud
In this issue of the Fighting Fraud e-newspaper, observe a series of articles dedicated to highlighting the global trends, challenges and advancements as they relate to fraud. Key topics covered in this issue include Brexit, artificial intelligence, insider threats, the true cost of cybercrime, and more.

Dtex

CW+: Business opportunities in the North American mobile market
In May, 2010, Verizon Wireless told investors at Barclays Capital media and technology conference in New York that it expected to offer customers who signed up for its 4G services monthly “buckets” of data.

ComputerWeekly.com

HP Data Protector 6.1 Software: VMware Integration Installation Best Practice
This white paper provides information on how to plan and install the HP Data Protector VMware Integration in different ways.

Hewlett-Packard Company
11 - 20 of 9368 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info