ComputerWeekly.com Research Library

Powered by Bitpipe.com

Hackers Research

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • The Evolving Threat Landscape

    Sponsored by: Juniper Networks, Inc.

    This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.

  • IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle

    Sponsored by: IBM

    As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.

  • The Next Generation of Cybercrime: How it's evolved, where it's going

    Sponsored by: DellEMC and Intel®

    Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.

  • E-Guide: The dangers of application logic attacks

    Sponsored by: TechTarget Security

    Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.

  • Why Hackers have turned to Malicious JavaScript Attacks

    Sponsored by: Sophos

    Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.

  • Death and Taxes...and Hackers

    Sponsored by: Imperva

    View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI

    Sponsored by: IBM India Pvt. Ltd

    Read this Tip Guide to discover workable, profitable best practices for embedded software development.

  • E-Book: NERC Compliance

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.

  • The Anatomy of a Cross-Site Scripting Campaign

    Sponsored by: Imperva

    XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  • Presentation Transcript: Building a Solid Foundation for Security and Risk Management-- A Practical Approach to Achieve Security High Performance

    Sponsored by: IBM

    Read this presentation transcript to learn about recent market research results from Enterprise Management Associates (EMA) regarding the greatest security challenges facing today’s businesses and what you must consider when building a solid IT security management foundation.

  • Security Threat Report: 2010

    Sponsored by: Sophos UK

    The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  • Information Security Magazine: May 2010 - Data: Do you know where it’s going?

    Sponsored by: Information Security Magazine

    This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.

  • Top Tips to Securing your Business Reputation

    Sponsored by: AVG Technologies USA, Inc.

    Reputation is everything in the world of a small business. It often takes years to establish a good reputation, but unfortunately it can take far less time lose one. Read this paper to learn tips that will help you keep your reputation secure.

  • Beating Web Application Security Threats

    Sponsored by: Thawte Inc.

    The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.

  • Managing a Growing Threat: An Executive’s Guide to Web Application Security

    Sponsored by: IBM

    Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.

  • Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities

    Sponsored by: IBM

    Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.

  • Buyer’s Guide to Antimalware

    Sponsored by: AVG Technologies USA, Inc.

    Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.

  • Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities

    Sponsored by: IBM

    Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.

  • Authentication in the Enterprise: Current and Changing Requirements

    Sponsored by: PistolStar, Inc.

    This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

  • Database Crime Scene Prevention

    Sponsored by: Imperva

    This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Web Based Attacks

    Sponsored by: Symantec Corporation

    This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

  • Web Application Security Trends Report Q3-Q4, 2008

    Sponsored by: Cenzic

    Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.