IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats Reports
Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper reviews the current DDoS landscape and examines why firewalls, IPS, and WAFs cannot stop modern DDoS attacks.
Posted: 02 Oct 2015 | Published: 20 May 2015


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


Uncover advanced attacks and detect breaches
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Hewlett-Packard Company

Cloud Security: Revealing Shadow Data
sponsored by Elastica
WEBCAST: This webcast presents how Shadow Data creates countless vulnerabilities in your cloud security strategy.
Posted: 08 Sep 2015 | Premiered: Aug 19, 2015


An Unlikely Partnership? Application Security and Development
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Hewlett-Packard Company

The Perils of Phishing
sponsored by IBM
WHITE PAPER: This white paper provides you with essential information on how phishing attacks occur and how you can mitigate these threats.
Posted: 11 Sep 2015 | Published: 31 May 2015


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Special Report: The Cost of Failed Trust
sponsored by Venafi
WHITE PAPER: This Ponemon report uses recent cybersecurity data to reveal why cryptographic keys and digital certificates are less trustworthy than many organizations believe.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement