IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

IHU Threats

RSS Feed    Add to Google    Add to My Yahoo!
IHU Threats Reports
 
Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security
sponsored by Lumension
WHITE PAPER: Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Posted: 10 Jun 2008 | Published: 15 May 2008

Lumension

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery
sponsored by Iron Mountain
WHITE PAPER: Backup of business-critical data can be vital for the survival of any small to medium-sized business (SMBs). Read this paper to learn ten reasons why online server back up allows SMBs to cost-effectively backup data and concentrate on business goals.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

10 Easy Steps for Email and Web Best Practices
sponsored by Symantec Hosted Services
WHITE PAPER: Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...
Posted: 02 Nov 2006 | Published: 01 Nov 2006

Symantec Hosted Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement