IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Multimedia (View All Report Types)
26 - 50 of 211 Matches Previous Page  |  Next Page
Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015


Mobile Threat Management - Detecting and Preventing App Attacks
sponsored by IBM
WEBCAST: In this brief webcast, you will learn how to detect, analyze, and prevent mobile threats against the enterprise.
Posted: 11 Aug 2015 | Premiered: Jul 29, 2015


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This webcast explores watering hole attacks and how to detect them before vulnerabilities are exploited.
Posted: 03 Aug 2015 | Premiered: Jul 8, 2015


How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015


The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015


Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013


Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: Discover legal dangers to look out for and begin preparing a proactive strategy to avoid them. Experts discuss real case studies illustrating how legal and IT can collaborate to mitigate the liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015


Emerging Threats: New Techniques and Countermeasures
sponsored by
VIRTUAL ENVIRONMENT: In this virtual classroom, you'll find videos, white papers, and expert advice that can help you prepare for the next wave of cybercrime.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

Security case study: Improving your network visibility
sponsored by Gigamon
VIDEO: This case study introduces a new security approach used by the University of Glasgow, a renowned academic institution, which improves network visibility and security without adding on expensive appliances. View now to learn how to detect and remedy infected endpoints, among other solutions.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015


SSL Decryption for Greater Threat Visibility
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014


Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Next-Generation Firewalls: Breaking Through the Hype
sponsored by
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

Rethinking the Paradigm of Advanced Threats
sponsored by
VIRTUAL ENVIRONMENT: Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015

Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Acquiring a top-notch compliance management system for SQL Server is no easy task. Fortunately, we can help. Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015


Show Me Simpana--Protect Your Data with Simpana 10
sponsored by Commvault
WEBCAST: Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.
Posted: 09 Sep 2014 | Premiered: Jul 25, 2013


Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014


Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company
26 - 50 of 211 Matches Previous Page    1 2 3 4 5    Next Page
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement