IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
51 - 75 of 1296 Matches Previous Page  |  Next Page
New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about 5 key areas where security is commonly lacking and why they are important to shore up to protect your enterprise from today's threats.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy an advanced security approach to combat ransomware using next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 05 Jun 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden or GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

How Hybrid Cloud Has Transformed Security of the Data Center
sponsored by TrendMicro
WHITE PAPER: Learn how server security has evolved in the face of cloud computing, and what it takes to secure your company's servers today.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

TrendMicro

Prevent Socially-Engineered Targeted Attacks: Vendor Spotlight
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how anti-spear phishing, anti-whaling, and specialized threat analysis and protection (STAP) features are the best techniques to prevent socially-engineered, targeted cyberattacks, as well as how to evaluate vendors, essential buyer guidance on a leading vendor, and more.
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

Stopping Crypto Ransomware
sponsored by Datto, Inc.
WHITE PAPER: Discover a 16-point guide to combating crypto ransomware in today's threat landscape.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

The Essential Cybersecurity Toolkit for SMBs
sponsored by Datto, Inc.
WHITE PAPER: According to the National Small Business Association, 44% of small businesses have been the victim of a cyberattack and the number of breaches reported per year continues to climb. Learn how to develop a robust, multi-layered cybersecurity strategy for SMBs.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Datto, Inc.

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover how to secure today's servers by examining the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

TrendMicro

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

A Security Leader's Definitive Guide To The Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 major threats to your organization, how to deploy an integrated security fabric connecting endpoints with networks across the cloud, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Key Considerations for Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 4 key considerations for securing privilege on the endpoint, how privilege is abused by malicious actors to cause breaches, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Top 5 Reasons to Prioritize Privileged Account Security Today
sponsored by CyberArk Software, Inc
WHITE PAPER: Learn 5 reasons to prioritize privileged account security in today's threat landscape.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

CyberArk Software, Inc

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

DNS Moves to the Core of IT Security
sponsored by Infoblox
WHITE PAPER: Learn how to approach the serious threat of DDoS attacks comprehensively and protect your DNS.
Posted: 31 May 2017 | Published: 31 May 2017

Infoblox

Create an Early Warning System for Evolving Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to deploy an early warning system for evolving cyber threats, enabling your organization to prevent, detect, predict, and rapidly respond to cyberattacks.
Posted: 31 May 2017 | Published: 31 May 2017

Dell SecureWorks

Data Exfiltration and DNS – Closing Back-Door Access to Your Sensitive Data
sponsored by Infoblox
WHITE PAPER: DNS is increasingly being used as a pathway for data exfiltration either by malware-infected devices or by malicious insiders. This paper lays out the tactics hackers use to exploit DNS for purposes of DNS tunneling and data exfiltration.
Posted: 31 May 2017 | Published: 31 May 2016

Infoblox

The Danger Within: Unmasking Insider Threats
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover the who, what, why and how of the insider threat to expose risks you may not be considering. Also uncover guidance to help you prevent and detect these costly attacks.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 5 reasons cybersecurity remains a major issue for enterprises today and how to mitigate their risk as well as improve your organization's risk threshold.
Posted: 31 May 2017 | Published: 31 May 2017

Fortinet, Inc.
51 - 75 of 1296 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement