Malware Research
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
It's Time Businesses Wake up to Mobile Security Reality
Sponsored by: Threat Track SecurityThis white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
Sponsored by: FireEyeThis informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Beyond the Breach
Sponsored by: FireEyeThis informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
-
Cloud Adoption & Risk Report
Sponsored by: SkyHighThis survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
-
Analyzing Four Widely Exploited Java Vulnerabilities
Sponsored by: FireEyeThis informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
The File Transfer Security Evolution
Sponsored by: GlobalscapeThis white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.
-
Cyber Preppers Guide
Sponsored by: Threat Track SecurityThis informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
Top 10 Ways to Assess The Risk of Data Loss
Sponsored by: InfrascaleThis white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
-
Phishing: The Latest Tactics And Potential Business Impacts
Sponsored by: SymantecThis informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
-
The Power To Destroy: How Malware Works
Sponsored by: SymantecView this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
-
The Business Value of Integrated Anti-Virus Management
Sponsored by: IBMThis white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
-
The Fight for Full Network Visibility in a Dangerous World
Sponsored by: APCON, Inc.This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
How to Limit the Risk of Attack on your XP Assets
Sponsored by: AT&T CybersecurityThis webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
-
Internet Security Threat Report - 2014
Sponsored by: Symantec CorporationThis in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
-
Adapting to the new web security and email security threats
Sponsored by: Cisco Systems, Inc.In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Which Endpoint Security Service is Best? Breaking Down 5 Top Solutions
Sponsored by: OpenText Security SolutionsThis guide explores the management functionality of five cloud endpoint security services, along with the process needed to identify an effective anti-malware product for your clients' environments.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Detecting and Preventing Retail Cyber Crime
Sponsored by: LogRhythm, Inc.Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.