IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Threats White Papers (View All Report Types)
Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: This white paper outlines the 6-point anatomy of APTs and how they evade traditional cybersecurity architectures.
Posted: 24 Aug 2015 | Published: 29 Jul 2015


Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015


Information Security in 2015: Just How Much Worse Can Things Get?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper analyzes the most damaging hacks and exploits of 2014, using the mistakes of the past to discuss what needs to be done in the future.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

IntraLinks, Inc

Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014


10 Cyber Threats Outside the Firewall
sponsored by Neustar┬«
WHITE PAPER: Examine a list of 10 current threats that exist outside of perimeter network security measures in this exclusive white paper. View now to learn how to stop these threats.
Posted: 09 Oct 2015 | Published: 17 Sep 2015


Hearts Continue to Bleed: Heartbleed One Year Later
sponsored by Venafi
WHITE PAPER: This white paper discusses why the Heartbleed vulnerability has taken so long to remediate and why you may still be more vulnerable than you think.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


Are Cybercriminals Hiding in Your SSL Traffic?
sponsored by Venafi
WHITE PAPER: This white paper examines how hackers can hide their exploits in encrypted SSL traffic and suggests ways you can stop them.
Posted: 10 Sep 2015 | Published: 10 Sep 2015


Security Intelligence for the Financial Sector in 2015
sponsored by IBM
WHITE PAPER: This white paper examines the cyber-attacks the financial sector faced in 2014, discussing some of the broader trends of that year and what those trends mean for financial security going forward.
Posted: 09 Sep 2015 | Published: 30 Jun 2015


Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 06 Oct 2015 | Published: 17 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement