IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security AdministrationReports
 
Proper Cloud Fraud Detection and Prevention Practices for Cloud Providers
sponsored by ThreatMetrix
EGUIDE: This expert E-Guide discusses how cloud-based fraud occurs and consequences of failure to detect fraud.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ThreatMetrix

Presentation Transcript: Emerging security threats: Know your enemy in 2014
sponsored by Imperva
TRANSCRIPT: In this presentation transcript, Johannes Ulrich, Dean of Research at the SANS technology institute, discusses new spearfishing attacks and explains how utilizing DNS logs can help organizations keep their network secure from these devastating new threats.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Imperva

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 07 Apr 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Fortify Your App
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Hewlett-Packard Company

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them
sponsored by Lumension
WEBCAST: This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key strategies for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement