IT Management  >   Systems Operations  >   Security  >  

Internet Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internet ThreatsReports
 
Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. The solution: grow your own.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Close the Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper explores the results of a recent Forrester study of 180 security leaders on the current state and effectiveness of vulnerability management.
Posted: 12 Nov 2014 | Published: 28 Feb 2014

Tenable Network Security

Plan to Migrate Before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: View this expert e-guide to examine your options when migrating away from WS 2003 and how to overcome challenges. Discover how to assess which upgrade avenue is right to pursue for your workload and what is waiting for you if you choose not to migrate.
Posted: 10 Dec 2014 | Published: 04 Nov 2014

Hewlett-Packard Company

Full Analysis of the Cyber-Risk Management Landscape in 2014
sponsored by BitSight
WHITE PAPER: Continue on to this important whitepaper now to explore the state of cyber-risk management in 2014.
Posted: 20 Nov 2014 | Published: 18 Jun 2014

BitSight

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

SIEM Missteps? Tips to Help You Move Forward
sponsored by LogRhythm, Inc.
PODCAST: Download this expert podcast now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 02 Dec 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

A New Security Reality: The Secure Breach
sponsored by SafeNet, Inc.
WHITE PAPER: This informative white paper explains why our focus needs to shift from preventing breaches to accepting that they're inevitable, and aiming to ensure that when a breach does occur, critical data remains secure.
Posted: 12 Dec 2014 | Published: 24 Apr 2014

SafeNet, Inc.

Using Anomalies in Crash Reports to Detect Unknown Threats
sponsored by Websense
WHITE PAPER: In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.
Posted: 03 Dec 2014 | Published: 18 Feb 2013

Websense

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement