IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Hostile Structured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internal Hostile Structured Threats Reports
 
Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Mobile Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report examines how mobile workers perceive the risks associated with using sensitive data in public places and how they go about mitigating those risks.
Posted: 10 Dec 2015 | Published: 31 Dec 2012

OptioLabs

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

A Breakthrough in Insider Threat Detection & Prevention
sponsored by Intellinx Software Inc.
PRODUCT LITERATURE: Read this white paper and find out how tt provides a first-of-its-kind cross-platform surveillance system for unparalleled visibility of end-user activity across the enterprise.
Posted: 17 May 2007 | Published: 17 May 2007

Intellinx Software Inc.

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

10 Easy Steps for Email and Web Best Practices
sponsored by Symantec Hosted Services
WHITE PAPER: Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...
Posted: 02 Nov 2006 | Published: 01 Nov 2006

Symantec Hosted Services

On Lockdown: HMV/Waterstone’s asserts control over user activity
sponsored by Safestone Technologies
CASE STUDY: Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Safestone Technologies

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery
sponsored by Iron Mountain
WHITE PAPER: Backup of business-critical data can be vital for the survival of any small to medium-sized business (SMBs). Read this paper to learn ten reasons why online server back up allows SMBs to cost-effectively backup data and concentrate on business goals.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement