IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats White Papers (View All Report Types)
 
A Holistic Approach to Fending off Bots and Bot Networks
sponsored by Distil Networks
WHITE PAPER: In this white paper, discover how a cloud-based strategy can block bots in real-time before data and intellectual property theft can occur. View now to learn more.
Posted: 09 Apr 2015 | Published: 04 Feb 2015

Distil Networks

Choosing the Right Security Solution: Moving Beyond SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.
Posted: 03 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Breach Detection: 6 quick tips to strengthen your response plan
sponsored by Alert Logic
WHITE PAPER: This guide tells you the 6 essential steps needed for successful incident response.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

The Truth About Cloud Security Threats
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

How to Achieve Complete Mobile Security without Sacrificing User Experience
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at dealing with the difficult security challenges associated with mobility adoption. Read on to learn more.
Posted: 22 Apr 2015 | Published: 18 Dec 2014

BlackBerry

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Hackers and Dating App Vulnerabilities - A Match Made in Heaven
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 most dangerous data app vulnerabilities and offers steps to take for you and your users to mitigate risk.  Read on to learn more.
Posted: 21 Apr 2015 | Published: 11 Feb 2015

IBM

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement