Your Search returned 6 results from our Editorial content

Sort By


Ad fraud Trojan updates Flash Player so that other malware...

Someone call the malware antitrust commission: Recent versions of the Kovter ad fraud Trojan, which infects computers through Web-based exploits, close the door...


Patch Tuesday: Fairly quiet on the Microsoft front

Microsoft's "Patch Tuesday" set of monthly software patches is so minimal for January that at least one security firm is suggesting that IT shops first tend to recently...



Microsoft Patch Tuesday reinforces the value of software...

The latest round of monthly patches from Microsoft illustrates the need for organizations to move from older versions of Microsoft software if they haven't done...


Vulnerabilities in some Netgear router and NAS products...

Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that...



Sony releases a complicated fix for PlayStation 3 consoles...

Nope, Sony's bad PlayStation 3 update from last Tuesday that bricked some consoles wasn't a secret ploy to encourage more PS4 pre-orders--although for anyone affected...


Massive Java update won't get Oracle out of attacker's crosshairs...

Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but...


Your Search returned 8 results from our White Paper Library

Sort By

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Patch Management

Security Exposure: Software Portfolios

Read an empirical analysis of the patching challenge faced by the average private user.


Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Anti-Virus Solutions

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides insight into endpoint security and anti-virus deployment, and explores whether anti-virus solutions may mislead some organizations...

Symantec Corporation

Messaging Security

Choosing a Cost-Effective Email Solution

Spending your budget wisely and prioritizing where your budget is allocated can be a challenge during an economic crisis, but some business critical tools...

Bit9 + Carbon Black

Endpoint Security

Why the Endpoint Must be the New Security Focus

Today’s computing challenges require organizations to take a holistic, end-to-end approach to security, extending the traditional focus on network security...



Layered Protection - Thirteen Days of Cybercrime

A security breach could devastate your business – with multiple routes of attack, you need multiple layers of protection to stay secure. Read our whitepaper...

Kaspersky Lab

Endpoint Security

Practical Guide to IT Security Breach Prevention Part I:...

Did you know 59% of people fail to store their passwords securely?


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?