IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
Fighting Today's Advanced Attacks and Defending Your Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

The Importance of Secure Application Development Lifecycles
sponsored by White Hat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

White Hat Security

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 07 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Case Study: Secure File Sharing with Investors
sponsored by IntraLinks, Inc
CASE STUDY: This case study examines how an identity and access management program can protect data shared with collaborators and investors. View now to learn how to mitigate data leaks and theft.
Posted: 01 May 2015 | Published: 04 Dec 2014

IntraLinks, Inc

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

nti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Enabling The Secure And Rapid Adoption Of Cloud Services
sponsored by Microsoft
WHITE PAPER: Access the results of this Forrester report to discover what's driving the current trend towards adoption of cloud technology and why the benefits of cloud outweigh the potential security risks for many organizations. Read on to discover what your organization can do you address potential security risks in your cloud system.
Posted: 01 May 2015 | Published: 31 Oct 2013

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement