Software  >   Malware  >  

Root Kits

RSS Feed   
Root Kits White Papers (View All Report Types)
 
Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Splunk Security: Detecting Unknown Malware And Ransomware
sponsored by Splunk
WHITE PAPER: The traditional way of detecting an advanced malware or threat compromise in a Windows environment relies on using a signature-based anti-virus or malware product – but these won’t catch everything. Download this white paper to learn – step by step – how to detect unknown malware activity and early signs of compromise in a Windows environment.
Posted: 19 Apr 2021 | Published: 05 Jan 2021

TOPICS:  Malware
Splunk

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences