IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security Breaches White Papers (View All Report Types)
 
How to Block Malicious File Uploads
sponsored by OPSWAT inc
WHITE PAPER: File uploads offer an attack vector to cybercriminals. This white paper describes the best ways to prevent malicious file uploads and the keys to protecting your sensitive data.
Posted: 29 Aug 2017 | Published: 29 Aug 2017


Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

Protecting Your Servers in the Cloud Era
sponsored by TrendMicro
WHITE PAPER: While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

The Ransomware Survival Handbook
sponsored by Barkly
WHITE PAPER: This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

The Dawn of the DDoS of Things & 1 Tbps Attacks
sponsored by A10 Networks
WHITE PAPER: In this white paper learn how to prevent Mirai maleware, a type of DDoS attacks hackers use to compromise unsecured IoT devices.
Posted: 01 Sep 2017 | Published: 30 Jun 2017

A10 Networks

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement