IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
 
The Collaborative Data Privacy Handbook
sponsored by IntraLinks, Inc
WHITE PAPER: As more organizations share sensitive data, the risk of leak or theft increases.  This white paper outlines six steps to improving data privacy and sharing principles and preventing regulatory and market sanctions.
Posted: 13 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

Securing the Mobile Enterprise with 3 New Approaches
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 29 May 2015 | Published: 01 Apr 2015

HID

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

How Adaptive DLP is Securing the Agile Enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies, highlighting 5 vital areas in which adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Dealing With the Problem of Targeted Email Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn everything you need to know about how targeted email attacks occur, and what you can do to prevent them.
Posted: 21 May 2015 | Published: 30 Jan 2015

Trend Micro

Detect Fake SSL Certificates and Understand Network Security Risks
sponsored by Blue Coat Systems
EGUIDE: Read this e-Guide to learn about the new SSL security threats and how most enterprise wireless networks are likely vulnerable to Cupid, a proof-of-concept based on the Heartbleed attack.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Blue Coat Systems

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Data Security Research Report: Understanding Risks and Impacts on Customer Behavior
sponsored by Honeywell
WHITE PAPER: This report reveals just how heavily the threat of cybercrime weighs on consumers, and what they're doing as a result of it. Read on to discover what growing cybercrime means for your business, and how you can pacify consumer concerns.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

Honeywell

Network Intrusion Prevention Systems Product Analysis Report
sponsored by Dell Software
WHITE PAPER: This analyst white paper takes an in-depth look at the strengths and weaknesses of one firewall. View now to examine the analyst's scorecard for the product's performance and what you need to know about it.
Posted: 29 May 2015 | Published: 18 Dec 2013

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement