IT Management  >   Systems Operations  >   Security  >  

Network Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Threats Reports
The Economy of Security
sponsored by IBM
WHITE PAPER: Explore a simple 3 step strategy to keeping informed with cybercriminal activity and protecting your organization from becoming the next data breach headline. View now and learn how to block attacks before they break through.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

6 Key Security Transformations for Protecting Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper examines the six areas of cybersecurity that most need to transform if your business is going to stay secure in today's threat environment.
Posted: 03 Nov 2015 | Published: 30 Sep 2015


Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015


Avoid BYO Policy and Security Pitfalls By Addressing Mobile Threats
sponsored by Citrix
WHITE PAPER: This white paper highlights the legal risks of personally owned technology, and offers policy recommendations and mitigating technology solutions to protect business information. Examine 5 practical case studies to help you recognize and address potential threats from using personal devices at work.
Posted: 28 Oct 2015 | Published: 30 Sep 2014


Conquering Network Security Challenges in Distributed Enterprises
sponsored by Palo Alto Networks
WHITE PAPER: This whitepaper provides guidance for businesses evaluating the current state of their network security. Learn how to centralize network security governance and prioritize threats without affecting business flow.
Posted: 15 Oct 2015 | Published: 30 Jun 2015

Palo Alto Networks

Incident Response Spend Up As Firms Recognize Cyber-Attacks Are Inevitable
sponsored by IBM
EGUIDE: Access this expert guide to learn why an effective incident response plan may be your best defense against today's increasingly personalized cyber-attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

CISOs: Dos and Don'ts for Incident Response Management
sponsored by IBM
EGUIDE: This two-part guide includes an in-depth interview with corporate attorney and cybersecurity insider Chris Pierson on incident response planning and the role that a CISO should play. Next, IT service providers will uncover vital information on protecting SMB customers from sophisticated cyberattacks.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement