All resources sponsored by:

Websense

6 Matches
6 Steps to Protect Your Intellectual Property
sponsored by Websense
WHITE PAPER:In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense.
Posted: 31 Mar 2014 | Published: 31 Dec 2013
Get This Now


Why Java Exploits Remain a Top Security Risk
sponsored by Websense
WHITE PAPER:Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both.
Posted: 31 Mar 2014 | Published: 31 Dec 2013
Get This Now


Detecting Zero-Day Exploits in the Wild
sponsored by Websense
WHITE PAPER:This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.
Posted: 28 Mar 2014 | Published: 28 Mar 2014
Get This Now


Simplifying Compliance and Data Security for Health Providers
sponsored by Websense
WHITE PAPER:This informative paper discusses how you can simplify data security and compliance for health providers, providing helpful best practices for keeping you sensitive data safe in the age of mobility.
Posted: 16 Dec 2013 | Published: 16 Dec 2013
Get This Now


7 Stages Of Advanced Threats Cyber Attack Kill Chain
sponsored by Websense
WHITE PAPER:This important resource examines the seven stages of advanced threats, discussing in-depth how your organization can best protect itself and what tools are needed to keep your critical information safe.
Posted: 28 Oct 2013 | Published: 28 Oct 2013
Get This Now


The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER:Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012
Get This Now


6 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement