IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats Multimedia (View All Report Types)
1 - 25 of 211 Matches Previous Page  |  Next Page
The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Security Predictions for 2015
sponsored by SilverSky
WEBCAST: This webcast takes a look at the top security incidents and breaches over the past year and predicts how the cybersecurity landscape will develop for 2015.
Posted: 30 Jun 2015 | Premiered: Dec 11, 2014

SilverSky

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by SilverSky
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

SilverSky

The Human Firewall – Strengthening Email Security
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

New Capabilities of Next-Gen Firewalls
sponsored by Dell Software
VIRTUAL ENVIRONMENT: This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.
Posted: 01 Jun 2015 | Premiered: 10 Dec 2014

Dell Software

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

Managing SSL/TLS Vulnerabilities and Virtual Patching Best Practices
sponsored by Trend Micro
WEBCAST: Access this webinar to learn the options you have to better manage vulnerabilities and discover new methods to adapt and mitigate known and unknown threats.
Posted: 08 May 2015 | Premiered: May 12, 2015

Trend Micro

What to Do When Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


Anti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Enterprise Mobility: Security Strategies and Challenges
sponsored by Absolute Software
WEBCAST: In this webcast, you will uncover the top enterpise mobility challenges today.  View now to learn the four phases of BYOD to strengthen your security strategy and discover tips and best practices to minimize data loss risk.
Posted: 01 May 2015 | Premiered: Jan 2, 2014

Absolute Software

Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: In this webcast, a panel of experts discusses real case studies illuminating how legal and IT can collaborate to mitigate the business and legal liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com
1 - 25 of 211 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement