Research Library

Powered by

Mar 15, 2011
Mar 15, 2011
52 Page(s)

See all research from

  • Essential Guide to Threat Management

    Sponsored by:

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time. Sitting back, relying on passive alerting mechanisms is not an option;  you must actively defend your organization by hunting these intruders through counter-threat operations (CTOps).  Learn how CTOps can make a huge impact on your security landscape and turn your incident response team into the hunter it can be.

    Other articles covered in this guide include:  

    SCADA Insecurity: Critical Infrastructure Protection:  The Stuxnet worm has highlighted how vulnerable one’s critical infrastructure can become. Discover if protection efforts against new rising threats have come too late and if the industry and federal government have taken the proper steps to ensure SCADA systems are secure.

    Advanced Persistent Threat (APT): If you think you know everything about APT , think again. We’ll delve into the history of APT, debunk some common myths, and provide you insight on the most effective way to defend against it.  

    Banking Malware:  Cybercriminals are working hard day in and day out creating more sophisticated and stealthy banking malware. Although banks have stepped up their defense against fraud, criminals continue to figure out new methods of attack such as the SilentBanker, Clampi, and Silon. Read on to learn about these sophisticated Trojans and their functionalities.

    Web 2.0 Widgets: Widgets can all too easily distribute malicious code and malware through social networking sites such as Facebook and Twitter.  Learn how to assess the security of widgets before incorporation them into your Web 2.0 environment. 

    Sponsored By: ArcSight, an HP Company, Astaro, Core Security Technologies, GeoTrust, GFI Software, Imperva, Radware, Shavlik Technoloies, Sophos, Trend Micro, Veracode & Websense

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.