IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Threats Reports
 
Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST: Find out about data breach trends and statistics, including the cost of a breach and common attack strategies, in this webcast. View now to learn the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015

Absolute Software

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The additions of HITECH and OFR extend HIPAA's reach to business associates and partners. This webcast explores the consequences of a downstream violation and the penalties you will receive if a breach occurs. View now to learn why encryption isn't enough for your security and compliance strategy.
Posted: 05 May 2015 | Premiered: Oct 22, 2014

Absolute Software

Overcome the Most Feared Cloud Security Issues in 2015
sponsored by CloudPassage
EGUIDE: This expert e-guide debunks the most common cloud security fears and myths and examines what holds organizations back from deploying a cloud environment.
Posted: 13 May 2015 | Published: 06 May 2015

CloudPassage

Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.
Posted: 22 May 2015 | Published: 31 May 2014

IBM

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Challenges and Benefits of Making a Business Case for IAM
sponsored by Nexmo
EGUIDE: This expert e-guide explores the 5 critical issues in IAM that have plagued IT for the past 5 years. Additionally, continue reading to learn how one organizations is using IAM as a strategic tool for improving performance on top of information security.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nexmo
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement