IT Management  >   Systems Operations  >   Security  >  

Internet Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Threats Reports
 
Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: This white paper explains how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the backend components of your web solutions. Read on to examine how BYOD can improve your enterprise.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: This white paper outlines the 6-point anatomy of APTs and how they evade traditional cybersecurity architectures.
Posted: 24 Aug 2015 | Published: 29 Jul 2015

Gigamon

Threat Intelligence Report: What 2014's Hacks Mean for Today
sponsored by CrowdStrike
WHITE PAPER: This threat intelligence report analyzes some of the biggest hacks of 2014, form Target to the Ukrainian elections, and draws conclusions about what to look for in 2015 and beyond.
Posted: 04 Aug 2015 | Published: 01 Jan 2015

CrowdStrike

Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit
sponsored by SurfWatch Labs
WHITE PAPER: This report uses data from recent financial sector attacks to discuss trends in financial sector security.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Can You Tell If Your Cloud Servers Are Under Attack?
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to learn more about gaining visibility into your cloud or virtual infrastructure through an agile security and compliance platform.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Cyber security: Balancing risks and controls for finance professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

ComputerWeekly.com

Big Data SIEM on the Horizon
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn the three SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 12 Aug 2015 | Published: 05 Aug 2015

Splunk

Keeping Your Data Safe: Protecting Corporate Information in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the challenges of securing data in the cloud. Continue reading to explore the strategies that have worked for other organizations; the issues presented by human error; and more.
Posted: 14 Aug 2015 | Published: 05 Aug 2015

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement