Malware Research
-
Layered Security Doesn't Stop Cybercriminals – but VDI Might
Sponsored by: Dell, Microsoft and CitrixThis exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
Swiss Army Knife Security? How to Vet Integrated Tool Sets
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.
-
"Hacking as a Service," and Other Emerging Threats
Sponsored by: TechTarget SecurityLethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
-
Endpoint Security Management: Beyond Antivirus
Sponsored by: TechTarget SecurityAccess this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
-
Can New Security Tools Keep Your Network Clean?
Sponsored by: TechTarget SecurityModern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
-
Shore Up Your Office 365 Attack Surface
Sponsored by: ProofpointThis exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
-
Fighting Cybercrime in the 21st Century
Sponsored by: TechTarget SecurityStrengthen your security with these expert insights into fighting advanced crimeware.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
Sponsored by: TaaSeraThis expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
What's Behind a Cyber Attack?
Sponsored by: IBMThis white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
IT Executive Guide to Security Intelligence
Sponsored by: IBMThis helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
-
Five critical steps to achieving an effective application security program
Sponsored by: IBMThis white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
-
Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
Sponsored by: SophosThis buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
-
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
Sponsored by: AccelOps Inc.This informative whitepaper outlines 10 best practices for successful SIEM implementation.
-
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
Sponsored by: Threat Track SecurityThis informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
-
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
Sponsored by: Hewlett-Packard EnterprisePrevent future cyber attacks from occurring by modifying your company's security infrastructure.