IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security Breaches Reports
 
Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER: This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014

Absolute Software

6 New Best Practices for DNS
sponsored by Nominum, Inc.
WHITE PAPER: This white paper outlines 6 new DNS security best practices for service providers.  View now to learn more about mitigating DNS-based DDoS attacks.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nominum, Inc.

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Securing Shared Files and Data
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how one aerospace and defense supplies leader was able to improve identity and access management (IAM) to classified files and documents and improve user experience and security. Read on now to learn how you can provision and secure data access to collaborators.
Posted: 01 May 2015 | Published: 04 Dec 2013

IntraLinks, Inc

How Adaptive DLP is securing the agile enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies highlighting 5 vital areas that adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Inform: Optimize Your Enterprise Security
sponsored by Hewlett-Packard Company
EBOOK: The threat landscape is constantly evolving—and you need to keep up to stay safe. Learn the latest about today's risks and best practices in security.
Posted: 11 May 2015 | Published: 12 May 2015

Hewlett-Packard Company

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement