IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats Reports
Provide the Ideal Frontline Firewall Defense
sponsored by Barracuda Networks
WHITE PAPER: Discover the vulnerabilities of your application servers that malicious users are looking to exploit. Learn about what kinds of attacks to expect and how to provide a stellar frontline defense against these threats.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Barracuda Networks

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

Mobile Data Report 2016
sponsored by Wandera
ANALYST REPORT: Find an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Find significant new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage.
Posted: 20 Oct 2016 | Published: 30 Apr 2016


Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.
Posted: 26 Sep 2016 | Published: 26 Sep 2016


SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016


Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016


Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: The biggest obstacles to achieving "incident response excellence" are security and IT tool integration and coordinating incident response. Learn how the right security operations solution could simplify the coordination of incident response measures, effectively reducing your time-to-response.
Posted: 29 Sep 2016 | Published: 29 Sep 2016


Mobile Security: Gain Real-Time Threat Prevention
sponsored by Wandera
WHITE PAPER: Learn how to gain real-time threat prevention, compliance and data cost management for mobile devices. Discover how to block threats such as data leaks, malware, and man-in-the-middle attacks, responding with real-time policy enforcement.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement