Search Results for: Denial of Service Attacks

Malicious Mobile Apps
In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.

OpenText Security Solutions

Active defence through deceptive IPS
This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

TechTarget ComputerWeekly.com

Are monsters lurking at the edge of your business? It’s time to slay them.
In addition to driving connected intelligence, edge networking and computing can leave organizations vulnerable to increased security risks. To discover how you can address those risks with help from AI, and to unlock insights from Executive Partner at Independent Security Evaluators Ted Harrington, check out this white paper.

TOPICS: .NET
Hewlett Packard Enterprise

App Delivery: When It Absolutely, Positively Has To Be There in Milliseconds
With app delivery being more vital than ever, the future of ADP is evolving. Read on and you'll also find ways to rule out which ADP strategy is best for you, and gain confidence in your organization's data and application management.

TechTarget Networking

Crash Insurance: Protect Your Business with Virtualization
This whitepaper covers how virtualization can protect you against unpredictable disasters and includes six steps for crash-proofing your business.

VMware

Effective DR Planning Starts With Risk Analysis and Assessment
In this handbook, learns the ins-and-outs of risk assessment to make sure your organization is ready for any threat that comes your way.

TechTarget Disaster Recovery

The Security Risks of IoT
In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.

Fortinet, Inc.

BlackCat emerges as one of the top ransomware threats
After several notable ransomware attacks against major enterprises, the BlackCat gang is drawing the attention of security researchers who have connected it to other groups.

TechTarget ComputerWeekly.com

Build a strong network security foundation
Network security presents a vast array of security concerns for the modern IT security team, and with so many different topics falling under its umbrella, it is important to stay informed on the myriad issues concerning network security. This buyer's guide combines 3 articles on different key areas of modern network security. Read on to learn more.

TOPICS: .NET
TechTarget Networking

CW ASEAN: Time to dial up defences
In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.

TechTarget ComputerWeekly.com