IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security BreachesReports
 
Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive whitepaper now to learn about some ways you can reduce the costs, complexity, and administration resources of security for mid-sized businesses with a single solution for endpoint management.
Posted: 03 Dec 2014 | Published: 14 Oct 2014

IBM

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Win the Race Against Time to Stay Ahead of Cybercriminals
sponsored by IBM
WHITE PAPER: Discover how IBM Security QRadar Incident Forensics can help enterprises investigate and gather evidence on breaches.
Posted: 03 Dec 2014 | Published: 08 Jul 2014

IBM

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

SIEM missteps? Tips to help you move forward: Presentation Transcript
sponsored by LogRhythm, Inc.
PRESENTATION TRANSCRIPT: Download this expert presentation transcript now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

LogRhythm, Inc.

Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE: Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Dell

Cisco 2014 Midyear Security ReportĀ - Executive Summary
sponsored by Cisco
WHITE PAPER: Download this exclusive whitepaper now for an overview of the security landscape midway through 2014, including threat intelligence, rising trends, and much more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cisco

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement