Malware Research
-
Information Security ANZ March 2014
Sponsored by: TechTarget SecurityThis issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
-
Detecting Sophisticated Online Attacks with Streaming Analytics
Sponsored by: EMC CorporationDiscover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
-
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
Sponsored by: FireEyeThis white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
-
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
Sponsored by: GlobalscapeThis whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
Insider Edition: Antimalware Technologies and Techniques to the Rescue
Sponsored by: TechTarget SecurityIn this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
-
The Definitive Guide to the Next Generation of Threat Protection
Sponsored by: FireEyeThis in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
-
Symantec Intelligence Report - January 2014
Sponsored by: Symantec CorporationThis in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
-
Advanced Attacks Require Federal Agencies to Reimagine IT Security
Sponsored by: FireEyeThis guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
-
Supply Chain Analysis: From Quartermaster to Sunshop
Sponsored by: FireEyeThis in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
-
Securing your Midsized Business
Sponsored by: IBMThis guide explores security management strategies and how to combat the growth of sophisticated threats.
-
Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
Sponsored by: FireEyeWith cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
Sponsored by: ImpervaThis guide takes a look at 10 things that every web application firewall should provide.
-
Symantec Intelligence Report 2013
Sponsored by: Symantec CorporationThis in-depth report outlines the latest analysis surrounding cyber security threats and trends.
-
Hidden Lynx – Professional Hackers for Hire
Sponsored by: Symantec CorporationThis in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
-
Endpoint Protection Platforms for Enterprises
Sponsored by: Symantec CorporationThis guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Knowledge is Power: The Symantec Guide to Protecting your Website
Sponsored by: Symantec CorporationThis guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
-
Five Tips to Reduce Risk From Modern Web Threats
Sponsored by: SophosSafeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
-
Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
Sponsored by: Trend MicroAccess this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
-
Tips on Managing the Deluge of Information Security Threat Reports
Sponsored by: TechTarget SecurityDon't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
-
Information Security Emagazine: Best Practices for the Evolving Threat Landscape
Sponsored by: Hewlett-Packard EnterpriseIn this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
-
Best Practices For Your Threat Management Program
Sponsored by: IBMIn this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!
-
Endpoint Security Best Practices
Sponsored by: Symantec CorporationIn this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.