Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed   
Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Artificial Intelligence (AI) in Cybersecurity: Stopping Fileless Attacks
sponsored by Ziften
RESOURCE: AI has a growing role in cybersecurity as AI-based cybersecurity systems are outperforming traditional antivirus software. AI security models are proving to be particularly effective in defending endpoints against "fileless" attacks. In this blog, learn more about fileless attacks and how to defend against them.
Posted: 15 Apr 2019 | Published: 09 Oct 2018

Ziften

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Trend Micro, Inc.
RESEARCH CONTENT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 21 May 2019 | Published: 16 May 2019

Trend Micro, Inc.

How to Protect Your VDI Environment from Ransomware
sponsored by Fhoosh
EGUIDE: One major security risk to VDI environments is ransomware. Ransomware has the potential to be more damaging in VDI than in a physical desktop environment. In this e-guide, explore 3 tips IT administrators can take to better secure VDI environments.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Fhoosh

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

ComputerWeekly.com

New Technologies for HR Managers Boost Employee Experience
sponsored by SearchHRSoftware
EBOOK: Download this expert handbook to uncover several new forms of technology that are integral to the intelligent enterprise and learn how these tools can help to boost employee experience and give your organization a competitive advantage.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

SearchHRSoftware

Mobile Threat Report Q1, 2019
sponsored by McAfee, Inc.
RESEARCH CONTENT: If 2018 was the year of mobile malware, 2019 is the year of everywhere malware. Download this report to learn about a few simple steps that you can take to drastically improve your own security and that of the devices that surround them.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

McAfee, Inc.

Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement