IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats White Papers (View All Report Types)
 
Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Your Move to the Cloud: A Managed Services Opportunity
sponsored by AVG Technologies
WHITE PAPER: This white paper presents the various cloud security business avenues available, as well as the pros and cons of each
Posted: 23 Jun 2015 | Published: 25 Mar 2015

AVG Technologies

Bullet-proofing Office 365 Security
sponsored by ControlEmail
WHITE PAPER: In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.
Posted: 26 Aug 2015 | Published: 29 Jul 2015

ControlEmail

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: This white paper explains how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the backend components of your web solutions. Read on to examine how BYOD can improve your enterprise.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This white paper discusses the security challenges of cloud-based file sharing services and gives tips on how to enjoy their productivity benefits without putting your business at risk.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement