IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Windows XP Now Draws Hackers to it like Bees to Honey
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to find out how you can easily upgrade your software and protect yourself from the inevitable attacks.
Posted: 30 Jan 2015 | Published: 22 May 2014

IBM

Survey Results: How Are Security Analytics Used?
sponsored by AlienVault
WHITE PAPER: This survey explores issues of security analytics and intelligence, revealing how IT security teams use those tools to detect cyber-attacks.
Posted: 23 Feb 2015 | Published: 31 Dec 2014

AlienVault

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.

Taking Control of the Digital and Mobile User Authentication Challenge
sponsored by RSA
WHITE PAPER: In this white paper, view the strategies and policies available to managing user authorization and access to reduce risk and protect yourself from cyber-attacks. Read on to see how others have taken advantage of these strategies in several case studies.
Posted: 27 Feb 2015 | Published: 07 Jan 2015

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement