Malicious Logic White Papers

(View All Report Types)
Emerging Security Trends and Risks: Insights for the Business Executive
sponsored by IBM
WHITE PAPER: This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
Posted: 15 Nov 2013 | Published: 30 Jun 2012

IBM

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

Globalscape

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec Corporation
WHITE PAPER: Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Symantec Corporation

Knowledge is Power: The Symantec Guide to Protecting your Website
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Symantec Corporation

The Power To Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them
sponsored by Symantec Corporation
WHITE PAPER: This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.
Posted: 10 Sep 2013 | Published: 30 Apr 2013

Symantec Corporation

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security