Malware White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR

Malware

MORE SPECIFIC TOPICS:  Rootkits |  Software Viruses |  Spyware |  Trojan Horses |  Worms
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 619 Matches
What's Behind a Cyber Attack?
sponsored by IBM
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Get This Now
IBM

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Get This Now
Symantec Corporation

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Get This Now
BlackBerry

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
White Paper: | Posted: 25 Jul 2014
Published:24 Mar 2014
Summary:This white paper introduces a solution that helps financial institutions mitigate the risks of even the most sophisticated malware.
Get This Now
HID

Free Trial: Real-Time Threat Detection and Security Visibility from Day 1
sponsored by AlienVault
Software Download: | Posted: 24 Jul 2014
Premiered:24 Jul 2014
Summary:This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Get This Now
AlienVault

ActivID® Threat Detection Service
sponsored by HID
White Paper: | Posted: 24 Jul 2014
Published:03 May 2013
Summary:Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Get This Now
HID

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
White Paper: | Posted: 24 Jul 2014
Published:30 Jun 2014
Summary:This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Get This Now
IBM

Memory corruption attacks
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Get This Now
ComputerWeekly.com

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Get This Now
ComputerWeekly.com

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:05 Mar 2014
Summary:This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Get This Now
CDW Corporation

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Get This Now
CDW Corporation

Webcast: Security Threat Intelligence - Vendor Webcast
sponsored by CDW Corporation
Webcast: | Posted: 18 Jul 2014
Premiered:Apr 30, 2014
Summary:This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Get This Now
CDW Corporation

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Get This Now
CDW Corporation

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Get This Now
CDW Corporation

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Get This Now
Webroot

1 - 15 of 619 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com