IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsWhite Papers (View All Report Types)
126 - 150 of 1211 Matches Previous Page  | Next Page
BYODs Dark Side Data Protection
sponsored by HP Autonomy
WHITE PAPER: This white paper explains how data protection issues can cause a lot of problems with BYOD initiatives. It also highlights one solution that helps secure the data on BYOD devices.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

HP Autonomy

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013

LogRhythm, Inc.

The new reality of mobile solutions: Everything you’ve been told about mobility is wrong
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper breaks down four huge misconceptions about mobility that is scaring organizations away from going mobile. It also provides ways to easily overcome any barriers to mobility across your organization by objectively matching the best mobility strategy to your unique IT requirements, business goals and user group needs.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc. and Intel®

BlackBerry COBO: Ultimate Mobile Security and Control
sponsored by BlackBerry
WHITE PAPER: When security and control are of paramount concern a COBO option can provide optimal protection against data loss and strict compliance with regulatory requirements. Read this whitepaper if you want to know your high-security users are equipped with mobile computing and communications capabilities that meet your corporate-only requirements.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

BlackBerry

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm vg.2, which offers security professionals a powerful monitoring and auditing platform to keep them informed, and excellent investigatory tool in case things go wrong.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

SIEM Tools to Optimize IT Security Management and Simplify Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this vendor landscape report to see how the top 10 SIEM vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

The Secret Ingredient in Mobile ROI: Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper looks closely at what the right EMM security solution does for business leaders, users and operations.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Protecting your Customers’ Online Banking Transactions Using the ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Protecting anytime, anywhere access is increasingly difficult using traditional security measures. Discover how organizations are protecting themselves.
Posted: 25 Jul 2014 | Published: 24 Mar 2014

HID

Vendor Report Card: How does AlienVault stack up?
sponsored by AlienVault
WHITE PAPER: This white paper reviews one company's security operations center, which is renowned for being tailored to small and medium-sized businesses (SMBs), with a host of additional features.
Posted: 24 Jul 2014 | Published: 26 Mar 2014

AlienVault

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM
126 - 150 of 1211 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement