Internet Security Research
-
Technical Guide on Malware Trends
Sponsored by: TechTarget SecurityTechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
E-Book: Technical Guide on PCI
Sponsored by: TechTarget SecurityTechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
-
E-Guide: How to Combat the Latest Cybersecurity Threats
Sponsored by: TechTarget SecurityIt takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.
-
Expert Guide to web 2.0 Threats: How to Prevent an Attack
Sponsored by: TechTarget SecurityA majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
-
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
Sponsored by: TechTarget SecurityToday’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
-
Technical guide on Web Security Gateways
Sponsored by: TechTarget SecurityMalicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
-
Buyer's Guide to Antimalware
Sponsored by: TechTarget SecurityCompanies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
-
Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
-
WebPulse Collaborative Defense
Sponsored by: BlueCoatMalware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
-
Stopping Fake Antivirus: How to Keep Scareware off Your Network
Sponsored by: SophosThis paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
-
Flushing Bank Invests in Internet Security with Webroot
Sponsored by: OpenText Security SolutionsNew York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.
-
Imperva’s Web Application Attack Report
Sponsored by: ImpervaImperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
-
Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL
Sponsored by: BlueCoatView this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more.
-
2011 Second Annual Ponemon Cost of Cybercrime Study
Sponsored by: ArcSight, an HP CompanyThis study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
-
Sophos Security Threat Report Mid-Year 2011
Sponsored by: SophosMalware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.
-
Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks
Sponsored by: Dell SecureWorksView this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.
-
Presentation Transcript: The Cybercrime War; When Are We Going to Win?
Sponsored by: Dell SecureWorksWhy are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
-
August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
Sponsored by: Information Security MagazineThis month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
-
Second 'Annual Cost of Cyber Crime' Study
Sponsored by: ArcSight, an HP CompanyThis study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
-
Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings
Sponsored by: Trend Micro, Inc.3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.
-
Why Hackers have turned to Malicious JavaScript Attacks
Sponsored by: SophosLearn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.
-
GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Sponsored by: GlobalSignThis white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
-
Trend Micro Endpoint Comparative Report Performed by AV-Test.org
Sponsored by: Trend Micro, Inc.In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.
-
FISMA Compliance: A Holistic Approach to FISMA and Information Security
Sponsored by: IBMIBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
-
NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
Sponsored by: NETGEAR Inc.Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.