IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Threats Reports
 
Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Threat Intelligence Report: What 2014's Hacks Mean for Today
sponsored by CrowdStrike
WHITE PAPER: This threat intelligence report analyzes some of the biggest hacks of 2014, form Target to the Ukrainian elections, and draws conclusions about what to look for in 2015 and beyond.
Posted: 04 Aug 2015 | Published: 01 Jan 2015

CrowdStrike

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Is Network Your Security More Like Eggshells or Diamonds?
sponsored by VMware
RESOURCE: This handy resource compares two popular network security approaches and outlines why focusing on perimeter defenses alone will end in a data breach. View now to learn how to protect your network from the perimeter to the data center.
Posted: 14 Aug 2015 | Published: 29 Jul 2015

VMware

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement