IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats White Papers (View All Report Types)
The State of DNS Security
sponsored by EfficientIP
WHITE PAPER: This white paper discusses why traditional security solutions leave your DNS vulnerable and gives suggestions for keeping your DNS secure.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015


Report on App, Platform and Device Preferences from Mobile Security Experts
sponsored by Good Technology
WHITE PAPER: Access this report for details on app, platform, and device preferences as analyzed by mobile security experts, and the methodologies behind them.
Posted: 25 Nov 2015 | Published: 06 Nov 2014

Good Technology

Why Online Trust is at the Breaking Point
sponsored by Venafi
WHITE PAPER: This infographic breaks down the danger that cryptographic keys and digital certificates are in, giving you essential statistics on the threats they pose to your organization.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 06 Oct 2015 | Published: 17 Jun 2015


How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Overcoming the Big Disconnect in Web Security
sponsored by Akamai
WHITE PAPER: This white paper explains why partnering with a security service provider is an effective way to tackle many of the security issues enterprises face. Learn how to adapt to the shifting threat landscape by locating a platform that provides cloud security solutions.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement