Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed   
Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Why Telstra for SD-WAN
sponsored by Telstra
RESOURCE: The network underlay plays a critical role in the SD-WAN overlay—and since the underlay network's capacity caps performance for the SD-WAN overlay, it is crucial that you have the best base to build your network on. Learn how you can build your SD-WAN overlay with Telstra in this interactive infographic.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

Telstra

You've Got Ransomware. Now What?
sponsored by Druva Software
WHITE PAPER: Find out what to do before and after your company is attacked by checking off the important steps in this checklist.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Druva Software

Mobile Threat Report Q1, 2019
sponsored by McAfee, Inc.
RESEARCH CONTENT: If 2018 was the year of mobile malware, 2019 is the year of everywhere malware. Download this report to learn about a few simple steps that you can take to drastically improve your own security and that of the devices that surround them.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

McAfee, Inc.

Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER: Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Dell SecureWorks

Frost and Sullivan: Global Bot Risk Management Award
sponsored by Akamai Technologies
ANALYST REPORT: In this Frost & Sullivan award announcement, explore their research of automated bot attacks, the expected market growth of BRM products and vendors, and why Akamai Technologies was awarded Market Leader.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Druva Annual Ransomware Report
sponsored by Druva Software
WHITE PAPER: Learn how other organizations, just like yours, are being targeted by ransomware attackers and how they are recovering from these attacks.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Druva Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement