IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


Conquering Network Security Challenges in Distributed Enterprises
sponsored by Palo Alto Networks
WHITE PAPER: This whitepaper provides guidance for businesses evaluating the current state of their network security. Learn how to centralize network security governance and prioritize threats without affecting business flow.
Posted: 15 Oct 2015 | Published: 30 Jun 2015

Palo Alto Networks

Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Make Your SIEM the Best It Can be
sponsored by
EBOOK: This resource will help you use your SIEM system to your utmost advantage.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Between Defense and Recovery: The Growing Trend Toward Mitigation
sponsored by Unisys
RESOURCE: This resource will help you gain an understanding of what a successful defense against cyber-attacks entails. Learn how a mitigation strategy can stop security threats from doing real harm, even once inside your system.
Posted: 05 Nov 2015 | Published: 14 Jul 2015


Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Where Cyber Security Fits Into Your Enterprise’s Business Plan
sponsored by Proofpoint, Inc.
EGUIDE: Experts review deception tools, tactics, and operations as a cybersecurity defensive strategy as an alternative to now failing network security approaches.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

CISOs: Dos and Don'ts for Incident Response Management
sponsored by IBM
EGUIDE: This two-part guide includes an in-depth interview with corporate attorney and cybersecurity insider Chris Pierson on incident response planning and the role that a CISO should play. Next, IT service providers will uncover vital information on protecting SMB customers from sophisticated cyberattacks.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement