IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
76 - 100 of 1282 Matches Previous Page  |  Next Page
Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

Continuous Endpoint Threat Detection and Response in a Point-in-Time World
sponsored by Cisco Systems, Inc.
WHITE PAPER: The only way to defeat today's security threats is to address them holistically across the full attack continuum – before, during, and after an attack. Discover an approach of continuous endpoint analysis in combination with a big data architecture to combat today's malware threat landscape.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Cisco Systems, Inc.

Ransomware: Everything You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

Cisco Systems, Inc.

7 Essential Components of a Threat Intelligence Program
sponsored by Recorded Future
WHITE PAPER: The goal of threat intelligence is to reduce operational risk. Uncover critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Recorded Future

Embrace Risk: Secure Your Hybrid Cloud
sponsored by HPE and Intel®
WHITE PAPER: Learn how to secure your hybrid cloud by treating security as something that should be built into the IT cloud strategy and its design from the very beginning.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

HPE and Intel®

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Should security pros rely on sandboxing as their single point of defense? Discover where sandboxing technology stands today, why it fails to meet the needs of organizations, and what's needed for effective malware analysis.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Your Guide to Spotting and Preventing Malware Infection
sponsored by Solarwinds MSP
WHITE PAPER: Learn about the types of attacks facing a typical network and uncover some successful mitigation strategies IT professionals have implemented to protect their networks.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Solarwinds MSP

Next-generation Firewall Platforms the Answer to NGFW Shortcomings?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall technology has evolved to be an essential cog in the overall cybersecurity machine, but it remains one of a multitude of puzzle pieces needed. In this ESG report uncover the NGFW shortcomings, and how to maximize their efficiency for your organization
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Secure Your Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure your email is protected against phishing attacks. Discover not only what to look for in threats coming in, but also how to tackle sophisticated email security challenges.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

The Ultimate Checklist To Preventing And Fighting Ransomware Attacks
sponsored by Cisco Systems, Inc.
WHITE PAPER: When it comes to battling ransomware, your best offense is a good defense. Is your organization prepared to ward off an attack? Run through these 10 steps to develop, or enhance your existing, ransomware defense strategy.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

Fine-Tune Money Laundering Detection Tools with Analytics, Machine Learning
sponsored by BAE Systems
WHITE PAPER: Discover how to improve money laundering detection with analytics and machine-learning that can help you fine-tune anti-money laundering (AML) tools and test, simulate, and export AML models.
Posted: 28 Feb 2017 | Published: 03 Jan 2017

BAE Systems

How ransomware can hold your business hostage
sponsored by Dell SonicWALL
WHITE PAPER: Delve into the modern malware threat landscape and gain a detailed understanding of how malware targets your company, how it works, why traditional methods fail to protect against it, and how to mitigate your risk.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Dell SonicWALL

3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

The new EUsecurityrequirements and you
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This infographic reveals how to support compliance while reaping business rewards. Learn about tools that deliver real-time threat intelligence, policy-based data usage assurance, and 2 more compliant ways to use and store data.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

4 Essential Capabilities for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover what ransomware is, what it does, and how customers can defend their organizations against it. Reveal what a layered defense strategy can do for your organization and how to best implement it.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

Viewpoints and Vendor Comparisons: Access Management and ID Federation
sponsored by IBM
WHITE PAPER: In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Protect Your Critical Assets with Identity Governance and Intelligence
sponsored by IBM
WHITE PAPER: Learn how integrating policy and governance controls with identity management processes would help your organization understand, control, and make better business decisions related to access and risk.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place
sponsored by Dell SonicWALL
WHITE PAPER: Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

8 Best Practices To Prevent Your Data From Being Held Hostage
sponsored by Dell SonicWALL
WHITE PAPER: Discover 8 best practices to protect your organization against ransomware attacks, minimizing your attack surfaces as well as reducing your vulnerability and strengthening your overall security posture.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: IT is in state of crisis, with hundreds of millions of identities stolen annually. Access this resource to better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough for today's security landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM
76 - 100 of 1282 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement