IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Threats Reports
 
nti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

Web-App Firewall: Protecting against DoS/DDoS Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines why traditional firewalls are insufficient to defend against malicious botnet attacks and how to rethink your security strategy.
Posted: 06 May 2015 | Published: 28 Dec 2012

Fortinet, Inc.

Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Top 10 Firewall Shopping Checklist
sponsored by Juniper Networks, Inc.
RESOURCE: In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.
Posted: 11 May 2015 | Published: 06 May 2015

Juniper Networks, Inc.

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

Web App Security Top 10 Risk Mitigation Techniques
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper lays out the top 10 challenges of and threats to web app security. View now to learn the corresponding 10 risk mitigation techniques to protect web apps.
Posted: 01 May 2015 | Published: 05 Mar 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement