IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet Threats Reports
 
Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This webcast explores watering hole attacks and how to detect them before vulnerabilities are exploited.
Posted: 03 Aug 2015 | Premiered: Jul 8, 2015

AlienVault

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

Holiday Ecommerce Security Preparedness: It's Never Too Early
sponsored by Neustar®
WHITE PAPER: This white paper acts a guide for how to ensure retail operations function efficiently and securely through the holiday season.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Understanding Today's Information Security Threats
sponsored by Dell SecureWorks
VIDEO: This video can help you understand what information security threats your organization faces and how you can best combat them.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

Dell SecureWorks

Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement