IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats White Papers (View All Report Types)
 
Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 12 Jun 2017 | Published: 30 Sep 2016

TrendMicro

How UEBA Reduces the Threat of Insider Data Leakage
sponsored by Veriato, Inc.
WHITE PAPER: Insider access means an employee can learn where sensitive data resides, the value of that data, and the best times to initiate an attack. This white paper examines how you can stop insider data leaks.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Veriato, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Stopping Malware and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: Non-malware attacks have quickly become extremely dangerous and prevalent. In 2016, 97% of organizations were targeted by non-malware attacks. Learn how to use endpoint security technologies to combat all forms of cyberattacks, not just malware.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec & Blue Coat Systems

Secure Browsing: Common Gaps, Best Practices, and New Technology
sponsored by Citrix
WHITE PAPER: Are you prepared to protect your browsers from targeted attacks seeking to compromise your organization? Take an inside look at one strategy that can help you centralize and secure browsers.
Posted: 04 Aug 2017 | Published: 31 Dec 2016

Citrix

How to Detect & Respond to a Petya Ransomware Attack
sponsored by AlienVault
WHITE PAPER: On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

AlienVault

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

TrendMicro

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement