Software  >   Malware  >   Spyware  >  

Internet Advertising Software

RSS Feed   
Internet Advertising Software Reports
 
eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

2019 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Nation-state adversaries were continuously active throughout 2018. Looking forward, there is ample evidence that adversaries will be forced to adapt and deploy stealthier tactics in order to continue their profitable operations. In this white paper, explore CrowdStrike's recommendations to maintain a strong defense.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

How Yelp Securely Connects People with Great Local Businesses
sponsored by Cisco Umbrella
CASE STUDY: At Yelp, it is the expectation that there will be a consistent high-level user experience for all customers. It is no surprise that Yelp is always seeking to enhance its security practices. This case study examines how Yelp built automation into its security practice to ensure the security of its customers and employees.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Cisco Umbrella

Protecting and Securing Your Critical Data with Acronis Backup
sponsored by Acronis
WHITE PAPER: This white paper introduces you to a security-rich data protection solution that addresses the growing threat that ransomware attacks pose: Acronis Backup. In order to prevent serious downtime and data corruption in your organization, check out this resource.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Acronis

Why Telstra for SD-WAN
sponsored by Telstra
RESOURCE: The network underlay plays a critical role in the SD-WAN overlay—and since the underlay network's capacity caps performance for the SD-WAN overlay, it is crucial that you have the best base to build your network on. Learn how you can build your SD-WAN overlay with Telstra in this interactive infographic.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

Telstra

CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 11 Jan 2019 | Published: 11 Jan 2019

ComputerWeekly.com

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk Services UK Ltd
WHITE PAPER: Cybersecurity tools send alerts to help identify malicious activity, but the burden remains with the organization to figure out whether that alert is meaningful and if and how it fits into a larger chain of malicious activity. In this white paper, explore 4 basic data sources that you can leverage for immediate visibility of security activities.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Splunk Services UK Ltd

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement