IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsWhite Papers (View All Report Types)
101 - 125 of 1141 Matches Previous Page  | Next Page
Top 10 Review: Voltage SecureMail Cloud Standard
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper highlights a secure email platform that scored 10/10 in reviews on recipient experience and administration tools
Posted: 17 Jun 2014 | Published: 31 Dec 2013

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


NSS Labs Breach Detection System Product Analysis – FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
WHITE PAPER: This white paper highlights the benefits of centralizing data on a single cloud platform to better protect today's decentralized IT infrastructure.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Box

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper offers 5 valuable steps to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

MSSP Data Sheet
sponsored by AlienVault
WHITE PAPER: This informative guide explores one company's unique MSSP platform and how it can greatly enhance your revenue and your customer's security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

AlienVault

Enterprise Executives and Consumers Lack Confidence About Cybersecurity
sponsored by Threat Track Security
WHITE PAPER: This informative guide outlines the lack of confidence many executives and consumers have about their cybersecurity.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Threat Track Security

Microsoft Extends Windows® XP Malware Support-Compliance Issues Remain
sponsored by Lenovo and Microsoft
WHITE PAPER: This informative guide explores the risks associated with Windows® XP and why now is the time to upgrade your operating system – ensuring system security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Lenovo and Microsoft

Security and Controlling Data in the Cloud
sponsored by Vormetric
WHITE PAPER: This white paper reveals the ability to extend existing security systems to cloud environments to provide consistent and all-around protection.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

Vormetric

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

Simplifying IT Operations and Improving Data Access Security
sponsored by Vormetric
WHITE PAPER: This resource explores the challenges in key management encryption and explains why current solutions fall short.
Posted: 12 Jun 2014 | Published: 31 Jul 2012

Vormetric

The One-Man SOC Webcast: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WHITE PAPER: This informative resource outlines top strategies for a highly effective SOC.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

AlienVault

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Limited
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Limited

U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attacks
sponsored by Threat Track Security
WHITE PAPER: This informative whitepaper outlines the vulnerability of U.S. defense contractors and explores what that means for your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Threat Track Security

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

TELUS leverages HP ArcSight and TippingPoint - Managed security service provider builds intelligentanalysis on tightly integrated HP solution
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource explains the reasoning behind MSSPs and how they help prevent cybercrime.
Posted: 10 Jun 2014 | Published: 01 Sep 2013

Hewlett-Packard Limited

Taking control of file sharing services
sponsored by Mimecast
WHITE PAPER: This white paper offers key recommendations on choosing an enterprise-grade file sharing service for optimum collaboration security.
Posted: 10 Jun 2014 | Published: 30 Apr 2014

Mimecast

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.
101 - 125 of 1141 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement