IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers White Papers (View All Report Types)
1 - 25 of 82 Matches Previous Page  |  Next Page
Are Your Security Controls Yesterday's News?
sponsored by Cymulate
WHITE PAPER: To find potential threats, many organizations have resorted to testing their security controls using a handful of common, "modern" methods. However, there are often limits that make these tests less effective. In this white paper, learn how a true threat actor simulation can properly test your security controls.
Posted: 19 Jul 2019 | Published: 31 Jul 2019

Cymulate

Using Wire Data for Security Forensics
sponsored by Viavi
WHITE PAPER: Security threats and attacks are growing in number and becoming increasingly more malicious, posing a severe threat to business survival. This white paper explains the means and importance of moving to a full wire data collection and enhancement strategy for both NetOps and SecOps operational and forensic capabilities.
Posted: 09 Jul 2019 | Published: 31 Mar 2019

Viavi

Prevent Targeted Data Breaches With 8 Steps
sponsored by Checkpoint Software Technologies
WHITE PAPER: Organizations need to take cybersecurity seriously, especially as data breach attacks become more targeted, evasive and lucrative. Too often businesses discover their vulnerabilities after a breach has occurred. In this white paper, explore the current data breach attack landscape and 8 steps you can take to proactively prevent them.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Checkpoint Software Technologies

A Cybersecurity Guide for Executives: Putting The Cyberlandscape In Perspective
sponsored by Checkpoint Software Technologies
WHITE PAPER: We've come a long way from the days when cybersecurity was the job of the IT Director. Today, there is consensus that not only does it need to be a top priority for organizations, but that executives must be accountable. This white paper will walk you through the key areas to focus on and the actions to take to secure your organization.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Checkpoint Software Technologies

6 Security Facts that Organizations aren't Considering
sponsored by The Media Trust
WHITE PAPER: In this white paper, discover the 6 security facts that you should start considering to make your websites more secure.
Posted: 03 Jul 2019 | Published: 03 Jul 2019

The Media Trust

Safeguard your devices against ransomware with Log360
sponsored by ManageEngine
WHITE PAPER: Network attack mechanisms continue to evolve on a daily basis. Of the network attacks that aim to steal or compromise data in some way, ransomware attacks have gained significance in recent times. In this white paper, learn how to properly implement and utilize SIEM as a defense against ransomware.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

A Best Practice Guide to Mitigating Ransomware in Your Enterprise
sponsored by ManageEngine
WHITE PAPER: One of the most lethal forms of cyberattacks, ransomware, can disrupt the most powerful institutions in the world, from government organizations to Fortune 500 companies. In this white paper, learn 4 simple best practices that your organization can implement to help prevent ransomware attacks.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Missing Cyberhygiene: Ransomware – Curse and Cure
sponsored by Open Systems Technologies
WHITE PAPER: Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.
Posted: 08 May 2019 | Published: 08 May 2019


Detect and Prevent Fraud Before Claims are Paid
sponsored by SAS
WHITE PAPER: Fraud losses represent an increasingly complex and systemic risk that's affecting the profitability of every insurance company. In this white paper, learn how SAS takes an enterprise approach to fraud detection and prevention by delivering software either on-site or via the cloud.
Posted: 27 Mar 2019 | Published: 30 Sep 2018

SAS

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER: How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

HackerOne

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Dell SecureWorks

Protect Your Online Business From Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

Akamai Technologies

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Dell SecureWorks

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

Using Splunk to Develop an Incident Response Plan
sponsored by Splunk
WHITE PAPER: Discover ways to help your organization prioritize threats and breaches and how machine data can help detect those breaches.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Splunk

AI and Machine Learning in Your Organization
sponsored by Splunk
WHITE PAPER: With machine learning-powered initiatives, you can detect issues before they paralyze your business. Download this resource for more on where you can apply machine learning and AI for insights.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Splunk

The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Commvault

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM
1 - 25 of 82 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement