Spyware Threats White Papers

(View All Report Types)
A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Security Testing For Financial Institutions
sponsored by Ixia
WHITE PAPER: Security breaches can result in loss of data, services and brand damage. Discover the benefits of engaging in early and frequent security analysis.
Posted: 05 May 2014 | Published: 31 Jan 2014

Ixia

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Enterprise