Research Library

Powered by

Internet Security Research

  • Technical Guide on Malware Trends

    Sponsored by: TechTarget Security

    TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

  • E-Book: Technical Guide on PCI

    Sponsored by: TechTarget Security

    TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

  • Stopping Fake Antivirus: How to Keep Scareware off Your Network

    Sponsored by: Sophos

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

  • Flushing Bank Invests in Internet Security with Webroot

    Sponsored by: OpenText Security Solutions

    New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

  • Imperva’s Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.

  • Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL

    Sponsored by: BlueCoat

    View this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more.

  • 2011 Second Annual Ponemon Cost of Cybercrime Study

    Sponsored by: ArcSight, an HP Company

    This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    Sponsored by: TechTarget Security

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

  • Sophos Security Threat Report Mid-Year 2011

    Sponsored by: Sophos

    Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.

  • Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks

    Sponsored by: Dell SecureWorks

    View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.

  • Presentation Transcript: The Cybercrime War; When Are We Going to Win?

    Sponsored by: Dell SecureWorks

    Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”

  • Expert Guide to web 2.0 Threats: How to Prevent an Attack

    Sponsored by: TechTarget Security

    A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

  • August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders

    Sponsored by: Information Security Magazine

    This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.

  • Second 'Annual Cost of Cyber Crime' Study

    Sponsored by: ArcSight, an HP Company

    This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Sponsored by: TechTarget Security

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

  • Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings

    Sponsored by: Trend Micro, Inc.

    3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.

  • Technical guide on Web Security Gateways

    Sponsored by: TechTarget Security

    Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

  • Why Hackers have turned to Malicious JavaScript Attacks

    Sponsored by: Sophos

    Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.

  • Buyer's Guide to Antimalware

    Sponsored by: TechTarget Security

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  • GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services

    Sponsored by: GlobalSign

    This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.

  • Trend Micro Endpoint Comparative Report Performed by

    Sponsored by: Trend Micro, Inc.

    In May of 2010, performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.

  • FISMA Compliance: A Holistic Approach to FISMA and Information Security

    Sponsored by: IBM

    IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.

  • NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects

    Sponsored by: NETGEAR Inc.

    Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.

  • E-commerce and Consumer Retailing: Risks and Benefits

    Sponsored by: ISACA

    ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges.

  • Presentation Transcript: Making Time for Endpoint Security

    Sponsored by: BigFix

    This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.