Software  >   Malware  >  

Root Kits

RSS Feed   
Root Kits White Papers (View All Report Types)
 
IoT Attack Handbook
sponsored by Radware
WHITE PAPER: Download this IoT Attack Handbook to learn about each Mirai attack vector, understand the profile and parameters of the attacks and explore how to defend against each of the attacks.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Ransomware 101: Three Key Ways to Start Combating Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware is stealing headlines and there is a reason to all the hype. The malware attack that takes over computer networks is a growing problem for organizations of all sizes. So what can organizations do to protect themselves? There are 3 key ways to combat the rising issue of ransomware. Find out how.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

Splunk

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

The Practical Security Guide to Prevent Cyber Extortion
sponsored by Panda Security
WHITE PAPER: What do you do if you are a victim of cyber extortion? Download The Practical Security Guide to Prevent Cyber Extortion for 5 recommendations on how to keep your company safe.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Panda Security

The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

CrowdStrike

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett Packard Enterprise

How to Unlock the Promise of Agile in the Enterprise
sponsored by Workfront
WHITE PAPER: This in-depth white paper discusses Agile, and how it can be implemented on a large scale. Read on to find out what benefits one can expect from enterprise-wide Agile implementation, and what challenges await.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

Workfront

Toshiba Launches Smart Social Infrastructure Through a Flexible, Scalable Cloud Solution
sponsored by IBM
WHITE PAPER: To advance its initiative, Toshiba required a more flexible, scalable cloud solution capable of supporting a wide range of complex projects. This whitepaper highlights the cloud software Toshiba implemented to provide an extensible cloud management framework.
Posted: 10 Dec 2014 | Published: 30 Apr 2014

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement