IT Management  >   Systems Operations  >   Security  >  

Information Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Information Security ThreatsReports
 
The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Qualys

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

2013 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

Podcast: How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
PODCAST: Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Posted: 18 Apr 2014 | Premiered: Apr 11, 2014

Trend Micro

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense

Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Stalking the Kill Chain
sponsored by EMC Corporation
WHITE PAPER: Access this exclusive resource to uncover the ins-and-outs of the "attacker kill chain", and kick potential security threats to the curb.
Posted: 15 Apr 2014 | Published: 31 Oct 2012

EMC Corporation

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
WHITE PAPER: This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
WHITE PAPER: This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement