IT Management  >   Systems Operations  >   Security  >  

Day Zero Threats

RSS Feed    Add to Google    Add to My Yahoo!
Day Zero Threats Reports
 
Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

The Current State of Server Security Affairs
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth examination of the current state of server security.
Posted: 27 May 2015 | Published: 26 Dec 2014

Trend Micro

Case Study: Deploying Secure Public WiFi
sponsored by Dell Software
CASE STUDY: This brief case study examines how one Australian city council enabled secure WiFi in all public buildings using a next-gen firewall to protect endpoints, users, and sensitive data. Access now to learn how to mitigate mobile and network threats.
Posted: 27 May 2015 | Published: 13 May 2015

Dell Software

Fighting Crimeware
sponsored by SearchSecurity.com
EBOOK: Examine crimeware, RAM scraping and advanced evasion techniques to learn how to defend systems, and investigate when defenses fail.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Hosted Exchange Security Questions You Should Be Asking
sponsored by Rackspace
EGUIDE: This expert e-guide presents the 6 questions you need to ask vendors about hosted Exchange environment security.
Posted: 22 Jun 2015 | Published: 17 Jun 2015

Rackspace

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement