IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
126 - 150 of 1279 Matches Previous Page  |  Next Page
Intelligent Security Management Ends Costly Network Breaches
sponsored by FireMon
WHITE PAPER: In this white paper, learn more about the challenges network breaches present and what technology can provide you with the functionality to prevent them.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

FireMon

5 Steps to Quantifying Insider Risk
sponsored by Veriato, Inc.
WHITE PAPER: Security is a matter of numbers: vague alerts like "we are at risk" do little for the security professional tackling the issue at hand. Learn 4 "insider risk laws", 5 steps to quantifying and addressing insider risk, and more.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

Keep Hires From Starting Fires: Risk Mitigation
sponsored by Veriato, Inc.
WHITE PAPER: Discover some common sense suggestions for improving the "beginning of the life cycle" risk mitigation process and reducing the exposure of your organization to possible insider threats.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

GPDR: How the Data Privacy Revolution Can Work For You
sponsored by Veritas
WHITE PAPER: Learn how the GDPR will affect your organization. Discover how to take advantage of the opportunity by taking a holistic view of information governance and turn the huge amount of unstructured backup data into available and usable information assets.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veritas

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

4 Steps to Reduce the Risk of Malicious Insider Activity
sponsored by Veriato, Inc.
WHITE PAPER: Learn 4 key steps in implementing a risk-based monitoring program, culminating in an ability to appropriately monitor user activity at every level, all while ensuring security and privacy are maintained.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Mitigate Insider Threats: User Activity & Behavior Monitoring Program
sponsored by Veriato, Inc.
WHITE PAPER: Learn how to best implement a user activity monitoring and/or user behavior analytics program to increase security against insider threats, drive productivity increases, and produce more efficient and effective employee investigations.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA

Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by McAfee, Inc.
WHITE PAPER: Discover a modular security optimization platform with an open design that allows you to scale to meet increasing compliance demands and a maturing threat landscape. Learn how you can automate first response using threat intelligence, increase reporting accuracy using behavioral analytics, and more inside.
Posted: 12 Apr 2017 | Published: 31 Oct 2016

McAfee, Inc.

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

Rapid Growth of SSL Encryption
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

Ending the Security Concerns Today's File Onslaught Presents
sponsored by McAfee, Inc.
WHITE PAPER: The intense volume of files organizations deal with today makes it difficult to recognize what's legitimate and what's malicious. In this short video, learn how to get the security you need to deal with today's onslaught of files.
Posted: 11 Apr 2017 | Published: 30 Dec 2016

McAfee, Inc.

User and Entity Behavior Analytics for McAfee Enterprise Security Manager
sponsored by McAfee, Inc.
WHITE PAPER: This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.
Posted: 11 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

3 Steps to Protect Your Data During the High Risk Exit Period
sponsored by Veriato, Inc.
WHITE PAPER: Discover 3 steps that can be put in place to mitigate the risk that employees place on your enterprise when they leave and take sensitive data with them.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Veriato, Inc.

Unmask Evasive Threats: Zero-Day Threat Detection and App Containment
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores how to bolster your defense to catch up to and overcome advanced malware threats. Fortify endpoints and learn how to halt zero-day malware in its tracks by discovering which threat detection and containment tools can unmask the most sophisticated hidden threats.
Posted: 11 Apr 2017 | Published: 31 Oct 2016

McAfee, Inc.

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security
sponsored by McAfee, Inc.
WHITE PAPER: Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. In this white paper learn how these programs adapt to threats based on new data in a 3 part learning process, separate static and dynamic data to sift the clean files from the malware, and more.
Posted: 11 Apr 2017 | Published: 28 Feb 2017

McAfee, Inc.

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

How to Gain Peace of Mind in the Cloud: Email and Office 365
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.
Posted: 10 Apr 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software
126 - 150 of 1279 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement