Virus Threats White Papers

(View All Report Types)
GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER: This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014

SkyHigh

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM