IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security ThreatsWhite Papers (View All Report Types)
 
Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Threat Management Gateway Replacement Guide
sponsored by Sophos, Inc.
WHITE PAPER: This TMG replacement guide covers a few key areas of Microsoft's TMG, and addresses a unified threat management system that can replace TMG and improve your network protection. Discover more about this system's interface that simply works, and why you don't need to panic without Microsoft's TMG.
Posted: 11 Aug 2014 | Published: 31 Jul 2013

Sophos, Inc.

Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9, Inc.
WHITE PAPER: Explore this brief paper that highlights 10 best practices to protect your company from a data breach while maintaining required PCI compliance (hint: all of these tips fall under these topics – visibility, asset control, enforcement, trust policy, and advance measurement).
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9, Inc.

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement