IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
76 - 100 of 1151 Matches Previous Page  |  Next Page
Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential
sponsored by LogicNow
WHITE PAPER: This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

LogicNow

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: This white paper describes how managed service providers (MSPs) and IT service providers (ITSPs) can help their clients mitigate the inherent risks of doing business within this increasingly complex cyber threat landscape.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

LogicNow

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

4 Steps to Developing a Proactive Security Program
sponsored by Dell SecureWorks
WHITE PAPER: Switch gears to a proactive defense. In 4 simple steps learn the discrete layers and levels needed for a security strategy that doesn't just react after the fact.
Posted: 24 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Security Intelligence: Efficiently Analyze Big Data Sources
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this resource to learn about a strategy for security intelligence that can empower you to correlate data across dozens of platforms, detect and deflect attacks, perform queries faster, and much more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Top 5 Benefits of a Security Operations Center
sponsored by IBM
WHITE PAPER: This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.
Posted: 14 Mar 2016 | Published: 31 Dec 2013

IBM

Internal Segmentation Firewall: Security Where You Need It, When You Need It
sponsored by Fortinet, Inc.
WHITE PAPER: While an edge firewall can do a great job of protecting the network perimeter, it can't help with internal attacks after a breach occurs. This resource describes how an internal segmentation firewall architecture protects network segments from malicious code that makes its way into the internal network.
Posted: 01 Mar 2016 | Published: 25 Jan 2016

Fortinet, Inc.

A Smarter Approach to Retail Order Security
sponsored by Prelert
WHITE PAPER: Many of the platforms that online retailers use to catch security risks require manual human input to alert on issues, allowing unknown or unexpected problems to go undetected until it's too late. This brief resource describes how automated machine learning can help online retailers stay competitive in today's e-commerce landscape.
Posted: 25 Feb 2016 | Published: 25 Feb 2016

Prelert

Internal Segmentation Firewalls for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how an internal segmentation firewall can benefit your enterprise by addressing internal threats and reducing data breaches in healthcare. View this resource to discover how you can securely deliver platforms that can enhance patient care, improve provider efficiency, and better comply with regulatory mandates.
Posted: 18 Feb 2016 | Published: 29 Oct 2015

Fortinet, Inc.
76 - 100 of 1151 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement