IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
101 - 125 of 1164 Matches Previous Page  |  Next Page
Security Intelligence: Efficiently Analyze Big Data Sources
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this resource to learn about a strategy for security intelligence that can empower you to correlate data across dozens of platforms, detect and deflect attacks, perform queries faster, and much more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Vendor Comparisons for Fifteen SIEM Products
sponsored by IBM
WHITE PAPER: This Gartner report can help you navigate the multitude of SIEM options available in today's marketplace and select the one that's right for you. Take a look to learn the strengths, weaknesses, and capabilities of fifteen leading SIEM products.
Posted: 17 Feb 2016 | Published: 20 Jul 2015

IBM

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility and learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 16 Feb 2016 | Published: 30 Dec 2015

Imperva

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

10 Features Every Web App Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: Security, convenience, and cost-effectiveness can all be achieved simultaneously. Discover ways to respectfully collect customer data while assessing risk based on device ID, user behavior, and other factors.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Internal Segmentation Firewall: Security Where You Need It, When You Need It
sponsored by Fortinet, Inc.
WHITE PAPER: While an edge firewall can do a great job of protecting the network perimeter, it can't help with internal attacks after a breach occurs. This resource describes how an internal segmentation firewall architecture protects network segments from malicious code that makes its way into the internal network.
Posted: 01 Mar 2016 | Published: 25 Jan 2016

Fortinet, Inc.

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Internal Segmentation Firewalls for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how an internal segmentation firewall can benefit your enterprise by addressing internal threats and reducing data breaches in healthcare. View this resource to discover how you can securely deliver platforms that can enhance patient care, improve provider efficiency, and better comply with regulatory mandates.
Posted: 18 Feb 2016 | Published: 29 Oct 2015

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

A Look Back: Last Year's Hottest Shadow Data Trends
sponsored by Blue Coat Systems
WHITE PAPER: Based on the analysis of nearly 63 million documents used in popular file sharing tools, this report examines the use of unsanctioned apps in the enterprise. Access now for in-depth findings on how your employees may be using these apps and what you can do to better plan cloud services.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Blue Coat Systems

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
101 - 125 of 1164 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement