Internet Worms

Internet Worms Reports
Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

Five Ways to Improve Your Wireless Security
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
Posted: 10 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET

Presentation Transcript: The Future of Information-Centric Security
sponsored by Palisade Systems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business.
Posted: 11 Sep 2009 | Published: 04 Sep 2009

Palisade Systems, Inc.

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

Microsoft Forefront Security for Exchange Server Beta
sponsored by Microsoft
TRIAL SOFTWARE: Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
Posted: 26 Sep 2006 | Premiered: 26 Sep 2006

Microsoft

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Juniper Networks, Inc.