IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
76 - 100 of 1218 Matches Previous Page  |  Next Page
How EMEA Businesses can Prepare for New and Better Ways to Work
sponsored by Citrix
WHITE PAPER: In this statistic-rich white paper, 500 IT professionals across Europe, the Middle East, and Africa reveal how mobile technology affects the way they work. Learn how to bridge the technology gap through workforce engagement, workplace reinvention, and optimized infrastructure.
Posted: 12 Jul 2017 | Published: 07 Jul 2017

Citrix

Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: Read this infographic to learn more about the trends, drivers, and challenges organizations face in regards to their workforce security.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell and Microsoft

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell and Microsoft

10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec

Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Report: Your Guide to Today's Threat Landscape
sponsored by Symantec
WHITE PAPER: Uncover 6 threats to your organization and how they have evolved over the past year, what specific dangers they pose to your enterprise, and what you can do to mitigate their harm.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

10 Benefits to Help Combat Ransomware
sponsored by Symantec
WHITE PAPER: Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

Security Ops: How Your Peers are Facing the Threat Landscape
sponsored by Splunk
WHITE PAPER: Discover the current state of security operations and how your peers around the globe are responding to security incidents of all sizes and types, and why it might seem like a losing battle.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Splunk

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Dealing with Ransomware, Business Email Compromise and Spearphishing
sponsored by PhishMe
WHITE PAPER: Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

PhishMe

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Rapid7

GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate
76 - 100 of 1218 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement