IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation White Papers (View All Report Types)
Top 5 Cloud Data Protection Challenges. Solved
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 28 Sep 2015 | Published: 24 Aug 2015


Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015


How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015


One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013


Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015


The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

Cyber Security Intelligence for 2015
sponsored by IBM
WHITE PAPER: This resource breaks down the cyber-attacks of 2014, presenting an overview of cybercrime that can help you stay safe in 2015.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015


Survey: Security Spending and Preparedness in the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: In this report, you'll find the results of a survey that reveals how financial organizations are adapting to new security concerns and how they need to do better.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement