IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

Your Guide to Choosing a Next Generation Firewall to Combat Today's Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Printing Security: The ‘Forgotten Link’ in Operational Excellence
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper covers the top 10 rules for effective printer security.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Best Practices to Secure your Virtual App & Desktop Solutions
sponsored by Citrix
WEBCAST: This exclusive webcast will detail how you can keep your virtual applications and desktop solutions safe.
Posted: 27 Jan 2015 | Premiered: Oct 14, 2014

Citrix

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Webroot Secure Anywhere ® Business Endpoint Protection
sponsored by Webroot
WHITE PAPER: This exclusive white paper dives into the changes you must make to your endpoint security to move on from a slow, heavy approach that ultimately causes more problems than it solves.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Webroot

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: View this webcast to learn how to weave security into development operations to bridge the gap between the two teams. Watch now to learn how to move from a waterfall to an agile strategy when developing and securing code.
Posted: 27 Feb 2015 | Premiered: Nov 19, 2014

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement