IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Threats White Papers (View All Report Types)
Cyber Security Intelligence for 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Aug 2015 | Published: 13 Nov 2014

Hewlett-Packard Company

Why Online Trust is at the Breaking Point
sponsored by Venafi
WHITE PAPER: This infographic breaks down the danger that cryptographic keys and digital certificates are in, giving you essential statistics on the threats they pose to your organization.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Enterprise Mobility Evolution: The New Age of BYOD
sponsored by StarMobile
WHITE PAPER: The consumer mobility market has exploded, experiencing massive growth. This white paper outlines a strategy for enterprise mobility management (EMM), as companies prepare to develop and support thousands of new apps. Read on to access the new approaches to app development.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


Actionable Threat Intelligence for Financial Services Organizations
sponsored by BrightPoint Security
WHITE PAPER: This white paper explains how automated and correlated threat intelligence capabilities can help even the largest financial institutions stay secure.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

BrightPoint Security

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company

Advanced Threat Detection and Remediation: Why it's Needed
sponsored by Hewlett-Packard Company
WHITE PAPER: An effective security program must not only attempt to detect and block incoming threats; it must detect and neutralize successful attacks before the damage is done, too. This white paper explains why advanced threat detection is now a necessary part of any cyber security program.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013


An Unlikely Partnership? Application Security and Development
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement