IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats White Papers (View All Report Types)
A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Maintaining Compliance in the New Era of Cloud Apps and Shadow Data
sponsored by Elastica
WHITE PAPER: This white paper examines how to leverage cloud apps and services while staying safe, secure, and compliant.
Posted: 04 Sep 2015 | Published: 31 Dec 2014


Continuous Compliance: Moving Beyond a Checklist Mentality
sponsored by Unisys
WHITE PAPER: Access this white paper to learn the 5 steps to continuously monitor activities to ensure ESF or RSF frameworks compliance.
Posted: 25 Sep 2015 | Published: 14 May 2015


Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Battling Security Threats from within Your Organization
sponsored by IBM
WHITE PAPER: This white paper explores the risk of insider attacks, both malicious and accidental, and gives tips on how you can secure yourself against them.
Posted: 11 Sep 2015 | Published: 30 Jun 2015


8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement