IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
101 - 125 of 1205 Matches Previous Page  |  Next Page
Protection and Productivity: Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Explore the challenges surrounding the proper handling of privileged accounts to mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

Evaluating Privileged Account Security: 7 Considerations
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn how to avoid giving malicious actors the "all-access pass" they want when trying to crack a privileged user account through 7 questions to ask your privileged account security provider.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

How to Quickly Reduce the Risk of a Breach
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover a 30-day framework, based off of lessons learned from actual data breaches, to implement a set of key controls around privileged credentials that can reduce your risk profile.
Posted: 30 May 2017 | Published: 30 May 2017

CyberArk Software, Inc

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec

Mobile and Cloud Security: MobileIron vs Microsoft Intune
sponsored by MobileIron
WHITE PAPER: This resource highlights the key differences between MobileIron and Microsoft's Intune. Discover how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 26 May 2017 | Published: 26 May 2017

MobileIron

Implementing Effective Incident Response
sponsored by Rsam
WHITE PAPER: Uncover how to more efficiently and more effectively respond to incidents with an incident response platform.
Posted: 26 May 2017 | Published: 26 May 2017

Rsam

The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Don't Settle for Good Enough Mobile Security: Transform Business Processes
sponsored by MobileIron
WHITE PAPER: Discover what security features your enterprise needs to consider in an EMM solution, and how to deploy one that will provide fully integrated mobile, cloud, and desktop management, protect your email on smartphones, and more.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

Plan, Don't Panic: When Colossal DDoS Attacks Loom
sponsored by A10 Networks
WHITE PAPER: Dive deep into a rundown of recent DDoS attacks, the specific enterprise challenges they present, and how to prepare your organization's defense.
Posted: 25 May 2017 | Published: 10 Nov 2016

A10 Networks

Accelerate DevOps by Automating Security
sponsored by evident.io
WHITE PAPER: Discover how to use a modern cloud-native approach to security and compliance, leveraging automation and the API-centric architecture of the cloud, so DevOps teams can enjoy accelerated development cycles while reducing the risk of breaches or delays and more.
Posted: 25 May 2017 | Published: 25 May 2017

evident.io

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

MSSPs: Benefits, Challenges and Trends
sponsored by AlienVault
WHITE PAPER: Discover the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource, their security programs.
Posted: 25 May 2017 | Published: 25 May 2017

AlienVault

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Ensure your DDoS Solution Works in Real-World Conditions
sponsored by A10 Networks
WHITE PAPER: Learn about the various types of DDoS attacks, challenges that are involved with detecting and mitigating these attacks, importance of validating any threat protection solution for real-world performance, and more.
Posted: 25 May 2017 | Published: 25 May 2017

A10 Networks

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Leveraging a Security-First Approach to Compliance
sponsored by evident.io
WHITE PAPER: Learn how to meet the challenges of public cloud environments with a modern approach of a security-first model which enables continuous visibility through automation and more.
Posted: 23 May 2017 | Published: 23 May 2017

evident.io

Why You Need an Automated Approach to Cloud Security and Compliance
sponsored by evident.io
WHITE PAPER: Learn how to embrace a continuous security model, making your organization able to automate many processes that would normally overwhelm your teams and systems if they had to be done manually.
Posted: 22 May 2017 | Published: 22 May 2017

evident.io

Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape

Operationalizing Threat Intelligence for Enterprise Security
sponsored by Splunk
WHITE PAPER: In this white paper, learn about a system designed to help you manage, categorize, and investigate security anomalies based on data that has been automatically collected and aggregated from multiple sources.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io
101 - 125 of 1205 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement