cyber attacks

Results 376 - 400 of 408Sort Results By: Published Date | Title | Company Name
By: FireEye     Published Date: Mar 20, 2013
Winning the War Against the New Breed of Cyber Attack.
Tags : fireeye, threat protection, cyber attacks, cybercrime
     FireEye
By: FireEye     Published Date: Mar 19, 2013
You have to do FISMA. You must defend against Cyber Threats.
Tags : fireeye, ciso, cyber security, fisma, cyber attacks, cyber exploits
     FireEye
By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : whitelisting, security, application control, cyber attacks, blacklist
     Bit9
By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : ddos, cyber attacks, research, enterprise, mobile, cloud, security
     Arbor Networks
By: FireEye     Published Date: Feb 12, 2013
Winning the War Against the New Breed of Cyber Attacks.
Tags : fireeye, threat protection, next-generation, next-generation threat protection, cyber attacks
     FireEye
By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats
     Tripwire
By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : security, network security, cyber attacks
     Lumension
By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
     Symantec
By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security
     FireEye
By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : fireeye, cyber attacks, firewalls, ips, protect, security
     FireEye
By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
     Damballa
By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
     Damballa
By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos
     CDW
By: ESET     Published Date: Sep 21, 2012
Cyber-attacks are now about making money. ACAD/Medre.A is a terrifying worm that stole AutoCAD files. This whitepaper shows how industrial espionage is a new threat.
Tags : computer worm, espionage, eset, industrial espionage, security
     ESET
By: FireEye     Published Date: Sep 11, 2012
Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks
Tags : cyber attacks, it security, targeted attacks, malware
     FireEye
By: FireEye     Published Date: Sep 11, 2012
Cyber Attacks on Government: How to Stop the APT Attacks that are Compromising Federal Agencies.
Tags : cyber attacks, apt attacks, federal, compromising, security
     FireEye
By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Results from the 2nd Annual Cost of Cyber Crime Study, clearly illustrate that despite increased awareness of the impact of cybercrime, cyber attacks continue to occur frequently resulting in serious financial consequences for business and government
Tags : 
     Quinstreet - Infosec
By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper will help you learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect when and how attackers have compromised their web server.
Tags : verisign, malware security report, bottom line, business protection, cybercriminals, malware attacks, online security
     VeriSign, Inc.
By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : blue coat, wan optimization, secure web gateway, application performance monitoring
     Blue Coat Systems
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com