IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Threats White Papers (View All Report Types)
2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Improving Your Web Security Intelligence by Contextualizing Data
sponsored by Akamai
WHITE PAPER: This white paper highlights the key components missing from your web security intelligence strategy. Learn how to secure your apps, web tools, and critical business information against a myriad of attacks and develop a holistic web security strategy.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Why Online Trust is at the Breaking Point
sponsored by Venafi
WHITE PAPER: This infographic breaks down the danger that cryptographic keys and digital certificates are in, giving you essential statistics on the threats they pose to your organization.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

Infographic: Is Your Data Classified?
sponsored by Identity Finder, LLC
WHITE PAPER: In a world where classifying your sensitive data prevents and reduces risk for 75% of breach events, it's in your best interest to be prepared. Access this infographic and learn methods for tackling classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

Five Reason to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This resource presents the top five benefits you can enjoy by adopting an MSSP. Find out what an MSSP can offer you and decide if an MSSP is the right solution to your cybersecurity dilemma.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement