IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats White Papers (View All Report Types)
Quantifying the Riskand Economic Impactof Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016


Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016


2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

The Virtual Firewall Buyer's Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Juniper Networks, Inc.

Protected to Innovate: Securing Your Hybrid Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Hewlett Packard Enterprise

Who Will CAVE First: Likely Targets of Ransomware
sponsored by Radware
WHITE PAPER: The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.
Posted: 21 Sep 2016 | Published: 21 Sep 2016


The Current and Future States of Cybersecurity in the Digital Economy: Part 1
sponsored by Unisys
WHITE PAPER: In part 1 of this 3-part cybersecurity report, explore the vulnerabilities in ICS systems, as well as methods for assessing risk in your ICS cybersecurity plan – helping you combat costly and damaging attacks to critical ICS systems.
Posted: 11 Oct 2016 | Published: 16 Sep 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement