IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers White Papers (View All Report Types)
1 - 25 of 104 Matches Previous Page  |  Next Page
Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016

Booz Allen Hamilton

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Cybercrime Exposed: The Hidden Economy of Cybercrime-as-a-Service
sponsored by Intel
WHITE PAPER: Access this resource for an inside look at the thriving economy of "cybercrime-as-a-service."
Posted: 07 Jan 2016 | Published: 31 Dec 2013

Intel

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Threat Intelligence Platforms: Everything You've Ever Wanted to Know But Didn't Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Applying the "Diamond Model" of Threat Intelligence
sponsored by ThreatConnect
WHITE PAPER: This white paper takes a fun and humorous approach to breaking down how successful hacks occur and how they can be prevented.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

ThreatConnect

When Minutes Count:How to Fight Advanced Threats with Real-Time SIEM
sponsored by Intel Security
WHITE PAPER: This report assesses organizations' abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response, including use of real-time SIEM solutions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Intel Security

Special Report: Best Practices for Incident Response
sponsored by Intel Security
WHITE PAPER: The SANS 2015 Incident Response survey results reveals an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Intel Security

Security Questions CEOs Should be Asking
sponsored by MASERGY
WHITE PAPER: This infographic highlights three of the most basic questions that you should be asking yourself about your security.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

MASERGY

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Big Data Analytics: Safety in the Digital Era
sponsored by SAS
WHITE PAPER: Cybercriminals cause a lot of damage. They destroy profits, erode customers' trust, and compromise safety. This white paper identifies the ways in which big data analytics improve online safety and security. Read on and explore the efficacy of big data analytics when faced with fraudsters.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

SAS

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Keep Your Customers Safe from Phishing
sponsored by Symantec Website Security Solutions
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Website Security Solutions

Strengthening Networks and Endpoints with Behavior-Based Protection
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a security strategy that effectively monitors the entire network for hidden threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM
1 - 25 of 104 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement