Hacker Detection White Papers

Hacker in a security context refers to a type of computer hacker who is involved in computer security/insecurity and is able to exploit systems or gain unauthorized access through skills, tactics and detailed knowledge.
Results 1 - 25 of 253Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

Tags : security, network security, kaspersky, hackers, firewall, disaster recovery, hacker detection, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: Staminus Communications     Published Date: May 06, 2014

In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of the attacks, the wide reaching impacts, and the true costs associated with DDoS attacks.

Tags : staminus communications, staminus, ddos, ddos attacks, hosting security, security, hacker detection, intrusion prevention
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End