IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system  … 
Definition continues below.
Hackers Reports
1 - 25 of 270 Matches Previous Page  |  Next Page
Cybersecurity: The New Agenda
sponsored by SilverSky
WHITE PAPER: In this white paper, recognized security expert Jim Anderson discusses how organizations need to change in order to protect themselves in the new threat landscape.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SilverSky

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by SilverSky
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

SilverSky

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This infographic gives you a quick breakdown of just how prevalent cyber breaches are and how much danger your organization may be in.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

IBM

Tackling Cyber-Enabled Financial Fraud
sponsored by SilverSky
WHITE PAPER: This white paper analyzes the problem of increased cyber-fraud and discusses how you can take back control of your organization's finances.
Posted: 06 Jul 2015 | Published: 31 Dec 2013

SilverSky

Considerations For Developing Big Data Security Analytics: A Practical Guide
sponsored by SilverSky
WHITE PAPER: This guide can teach you how to design, plan and implement a big data solution that will give you the most security benefits.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

SilverSky

Big data analysis: The essential next step for security
sponsored by SilverSky
WHITE PAPER: This white paper explains how you can use big data analysis to stop even the most sophisticated attacks.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

SilverSky

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by SilverSky
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

SilverSky

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine what a data breach will cost your organization.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Detect Fake SSL Certificates and Understand Network Security Risks
sponsored by Blue Coat Systems
EGUIDE: Read this e-Guide to learn about the new SSL security threats and how most enterprise wireless networks are likely vulnerable to Cupid, a proof-of-concept based on the Heartbleed attack.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Blue Coat Systems

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Enterprise Plans for Mobile Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how your competition is embracing mobile security and discover key trends that will keep your company data safe for mobile business.
Posted: 08 Jun 2015 | Published: 26 Dec 2014

Pulse Secure

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

10 IPS Platforms Reviewed and Compared
sponsored by IBM
WHITE PAPER: This report examines ten different IPS platforms and reviews them based on block rate, anti-evasion capabilities and more.
Posted: 01 Jun 2015 | Published: 31 Dec 2013

IBM

Current DDoS Attack and Security Landscape
sponsored by Neustar®
RESOURCE: This white paper report outlines the state of DDoS attack trends and the defensive approaches organizations are using. View now to learn why traditional DDoS defenses are allowing hidden malware to sneak through and the new approaches to mitigate DDoS attacks.
Posted: 29 May 2015 | Published: 25 Mar 2015

Neustar®
1 - 25 of 270 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): … A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system that cannot safely be destroyedAdd the application that is designed to record the activities of the invaderMaintaining a honey pot is said to require a considerable amount of attention and may offer as its highest value nothing more than a learning experience (that is, you may not catch any hackers).
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement