Saturday, January 14, 2017

Don't let malicious PDF exploits get through security

 
Preventing PDF Exploits
It’s not enough to have your security system fully up to date. You need to predict ways that bad actors will try to get their payloads past security. One of the most common ways malicious programs get through security software is as a PDF document.

This video discusses how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Not every security system pays appropriate attention to document readers and can be infiltrated by this back door.

Access now to see a side by side comparison of vendors as they attempt to deal with malicious documents.
Sponsored by: TrendMicro
VIEW NOW
More on This Webcast:
About the Speaker:
Dr. Jonathan Oliver, Data Scientist, TrendMicro

ABOUT THIS E-NEWSLETTER

This email is published by the TechTarget Security Media Group.

Copyright 2016 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.
VIEW NOW
SPONSORED BY TrendMicro
SPEAKER

Dr. Jonathan Oliver
Data Scientist, TrendMicro

No comments: