Software  >   Malware  >  

Netsky

RSS Feed   
Netsky White Papers (View All Report Types)
 
More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

5 Steps to Selecting an Enterprise Anti-Virus Replacement
sponsored by Ziften
WHITE PAPER: Selecting a replacement for your legacy enterprise antivirus software can be challenging however, there are frameworks to help you go about making the right selection. In this white paper, explore 5 steps to selecting an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

Ziften

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: This white paper will take users on a step-by-step journey through how to detect malware activity and early signs of compromise in a Windows environment.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement