IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
51 - 75 of 1176 Matches Previous Page  |  Next Page
How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Mobile Security: The Case for Enterprise Mobility Management
sponsored by Freudenberg IT
WHITE PAPER: Without a dynamic Enterprise Mobility Management (EMM) strategy in place, your company data risks being lost, stolen or otherwise compromised. Learn about the importance of establishing an EMM strategy and explore the multi-level approach your company may need to employ to ensure all your security and compliance demands are met.
Posted: 27 Jan 2017 | Published: 17 Jan 2017

Freudenberg IT

6 Tips to Maximize Productivity with Identity-as-a-Service (IDaaS)
sponsored by Microsoft
WHITE PAPER: Identity-as-a-Service (IDaaS) is an emerging strategy for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Learn the top six considerations to keep in mind when selecting your IDaaS.
Posted: 26 Jan 2017 | Published: 22 Jun 2015

Microsoft

A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Discover why it takes so long for organizations to discover when they have been breached. Learn how to mitigate, remediate, and recover faster.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

ServiceNow

The Ultimate Guide to Preventing Web Scraping
sponsored by Distil Networks
WHITE PAPER: It is estimated that 46% of all web activity is now down to bots. There are good and bad bots but web scrapers are in a gray area. Discover the issues around web scrapers and what can be done to control their activity.
Posted: 24 Jan 2017 | Published: 30 Dec 2016

Distil Networks

Worldwide DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

DDoS Attack Cybersecurity for 2017
sponsored by Neustar
WHITE PAPER: Learn about the modern DDoS landscape, what to expect from future trends, and how to keep the lessons learned from last year's attacks primed and ready to keep your organization safe.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

How to Speed Up Your Breach Detection Rate
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Reinventing Data Protection for Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Hewlett-Packard Enterprise

Navigate Your Way Around Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works, the most common variants that are active today, and 3 steps to recover from ransomware.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Barracuda Networks

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

How to Seamlessly Integrate Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.
Posted: 13 Jan 2017 | Published: 30 Sep 2016

Veracode, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases
sponsored by Logentries
WHITE PAPER: Explore 4 use cases that exemplify why real-time analytics using log data streams are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Logentries

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

How to Keep Your Organization Safe from Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.
51 - 75 of 1176 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement