ComputerWeekly.com Research Library

Powered by Bitpipe.com

Denial of Service Attacks Research

  • Malware Attacks Demand a New Malware Defense Approach

    Sponsored by: SearchSecurity.com

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

  • Information Security Breaches Survey 2013

    Sponsored by: ComputerWeekly.com

    Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.

  • Types of DNS Attacks Reveal DNS Defense Tactics

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Security as a Service: Benefits and Risks of Cloud-Based Security

    Sponsored by: SearchSecurity.com

    Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

  • 2012 Cost of Cyber Crime Study: UK

    Sponsored by: ComputerWeekly.com

    The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.

  • Cyber Risk Perceptions: An Industry Snapshot

    Sponsored by: ComputerWeekly.com

    Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • New UC Threats Leaving Your UC Platform Vulnerable

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.

  • Information security breaches survey 2012

    Sponsored by: ComputerWeekly.com

    Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.

  • Stopping application layer DDoS attacks: What you need to know

    Sponsored by: SearchSecurity.com

    While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.

  • 2012 Security Outlook

    Sponsored by: ComputerWeekly.com

    This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.

  • The real need for distributed denial-of-service protection: How to stop DDoS attacks

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.

  • Overcoming Security Breaches and Minimizing the Impact

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • DNS Firewalls and Defense Tactics

    Sponsored by: Infoblox

    Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

  • Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues

    Sponsored by: Akamai Technologies

    In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

  • The Business Case for Managed DDos Protection

    Sponsored by: Neustar®

    This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.

  • State of DNS Availability Report

    Sponsored by: Verisign, Inc.

    This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.

  • Threat Analysis: Understanding and Combating DDoS Attacks

    Sponsored by: Dell SecureWorks

    This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.

  • Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis

    Sponsored by: VeriSign, Inc

    Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • The Cybercrime Arms Race

    Sponsored by: Kaspersky Lab

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  • Methods, Motivations, and Mitigation of Insider Threats

    Sponsored by: VeriSign, Inc

    This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.

  • Targeted Cyber Attacks

    Sponsored by: GFI Software

    Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.