Malware White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR

Malware

MORE SPECIFIC TOPICS:  Rootkits |  Software Viruses |  Spyware |  Trojan Horses |  Worms
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 615 Matches
Live Demo: How to Detect a Cryptolocker Infection - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 23 Jul 2014
Premiered:Jul 23, 2014
Summary:This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Get This Now
AlienVault

Memory corruption attacks
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Get This Now
ComputerWeekly.com

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Get This Now
ComputerWeekly.com

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:05 Mar 2014
Summary:This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Get This Now
CDW Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Get This Now
IBM

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Get This Now
CDW Corporation

Webcast: Security Threat Intelligence - Vendor Webcast
sponsored by CDW Corporation
Webcast: | Posted: 18 Jul 2014
Premiered:Apr 30, 2014
Summary:This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Get This Now
CDW Corporation

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Get This Now
CDW Corporation

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Get This Now
CDW Corporation

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Get This Now
Webroot

After Malware: The Next Mobile Security Battle - Expert Webcast
sponsored by Sophos, Inc.
Webcast: | Posted: 17 Jul 2014
Premiered:Jul 7, 2014
Summary:In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Get This Now
Sophos, Inc.

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
Resource: | Posted: 16 Jul 2014
Published:16 Jul 2014
Summary:View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Get This Now
CDW Corporation

Top Tips for Managing a Mobile Workforce
sponsored by GFI Cloud
White Paper: | Posted: 14 Jul 2014
Published:14 Jul 2014
Summary:This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.
Get This Now
GFI Cloud

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley - Vendor Webcast
sponsored by Hexis Cyber Solutions Inc
Webcast: | Posted: 14 Jul 2014
Premiered:Jun 16, 2014
Summary:This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Get This Now
Hexis Cyber Solutions Inc

Multi-Layered Security
sponsored by GFI Cloud
White Paper: | Posted: 14 Jul 2014
Published:31 Dec 2013
Summary:Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Get This Now
GFI Cloud

1 - 15 of 615 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com