IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
 
How to Track Privileged Users' Activities in the Active Directory
sponsored by Lepide Software
EBOOK: Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

Win the War Against Ransomware
sponsored by Commvault
EBOOK: If you're ready to protect your data from the increasing risk of ransomware, consider these 6 tips.
Posted: 23 Jun 2017 | Published: 31 Aug 2016

Commvault

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Malware Review Q1 2017
sponsored by PhishMe
WHITE PAPER: Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

PhishMe

Overcoming the Human Factor with Visibility-Centric Security
sponsored by Gigamon
RESOURCE: Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Gigamon

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Malware Mitigation: The Threat of Anomalous Activity
sponsored by The Media Trust
WHITE PAPER: Learn the current state of malware and why you should adopt the tactic of "block first, ask questions later" to improve your security posture against this rising threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

The Media Trust

Hybrid Clouds: Best Practices for Harnessing and Securing
sponsored by TrendMicro
WHITE PAPER: Gain insight into understanding the business, organizational, and technical dimensions of securing hybrid clouds.
Posted: 12 Jun 2017 | Published: 30 Sep 2016

TrendMicro

Report: Your Guide to Today's Threat Landscape
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 6 threats to your organization and how they have evolved over the past year, what specific dangers they pose to your enterprise, and what you can do to mitigate their harm.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

Improving Endpoint Security and Signature-Based Detection
sponsored by Sentinel Labs, Inc.
EGUIDE: Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Sentinel Labs, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement