IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Microsoft Windows Security

RSS Feed   
Microsoft Windows Security Reports
 
E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by SearchSecurity.com
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

SearchSecurity.com

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SearchSecurity.com

PrimalScript Professional 4.0
sponsored by SAPIEN Technologies, Inc.
TRIAL SOFTWARE: PrimalScript Professional 4.0 now with a host of advanced features targeted at reducing script development time and effort and introducing PrimalScope, PrimalScript's truly built-in debugger for Windows scripting.
Posted: 01 Oct 2006 | Premiered: 01 Oct 2006


Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Seven for 7: Best Practices For Implementing Windows 7
sponsored by Sophos
WHITE PAPER: In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it’s the perfect opportunity to assess your...
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Sophos

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement