IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats White Papers (View All Report Types)
 
10 Steps for Protecting Executives Using Cyber Threat Intelligence
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper analyzes how social engineering and other technologies can help criminals to target your business's executives and assets, and it suggests ten ways you can protect them.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER: In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

2015 Cost of Data Breach Study: United Kingdom
sponsored by IBM
WHITE PAPER: This report analyzes the financial cost of cybercrime in the UK, discussing how much harm a hack can cause and what the implications are for your business.
Posted: 13 Jul 2015 | Published: 31 May 2015

IBM

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

IBM Security Services 2014 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Mobilize Your Email with Enterprise-Grade Security and Data Protection
sponsored by Citrix
WHITE PAPER: This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Citrix

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement