IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
151 - 175 of 1190 Matches Previous Page  |  Next Page
The Dark Side of SSL That Today's Enterprise Can't Ignore
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

How to Gain Passive DNS for Enhanced Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Access this white paper to discover how improving your DNS data collection can enhance your threat intelligence, give you faster, more accurate detection/mitigation abilities vs cyberattacks, and more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

Farsight Security

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Choosing the Right Provider for Mobile and Cloud Security
sponsored by MobileIron
WHITE PAPER: Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

MobileIron

Top Internet of Things Security Concerns
sponsored by Peak10
WHITE PAPER: 70% of IoT ready devices are vulnerable to hackers, and it doesn't look like there's an easy answer to fixing it. Learn what the trajectory towards a secure future state for IoT is shaping up to look like.
Posted: 03 Apr 2017 | Published: 02 Mar 2017

Peak10

Choose the Path to Complete Mobile Security and Productivity
sponsored by MobileIron
WHITE PAPER: Learn how MobileIron and Blackberry match up on vital criteria for enterprise mobility management and how your organization can reap the benefits of pairing with the right one for your particular needs.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

MobileIron

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

MobileIron and Microsoft's Intune MDM Go Head-to-Head in EMM offering
sponsored by MobileIron
WHITE PAPER: Uncover the key differences between MobileIron and Microsoft's Intune. Learn how to address some of the limitations of both offerings so you can make the best choice to meet mobile security requirements today and down the road.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

MobileIron

Secure Identity Experience in the Age of Connected Everything
sponsored by HID Global
WHITE PAPER: Discover how industry expert Christian Christiansen of IDC views security in the age of mobile workforces, smartphone apps, and cloud-based corporate information.
Posted: 24 Mar 2017 | Published: 31 May 2016

HID Global

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID Global

Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

How Enterprise Security Leaders are Now Forced to Address Top Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Today's IT threat landscape is expanding, and new areas are at risk that businesses have never had to worry about before. This white paper identifies 5 cyberthreat areas that are putting organizations at risk today, as well as some steps you can take to minimize the danger they pose.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Your Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Fortinet, Inc.

Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER: In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Securing Data Across Your Every Environment
sponsored by Gemalto
WHITE PAPER: Learn about cryptographic keys and how they can secure your vital data. Discover the 4V's model, how the level of encryption is applied, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo
151 - 175 of 1190 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement