IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security BreachesReports
 
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Efficacy of Emerging Network Security Technologies
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper provides an in-depth look at network security technologies and their true benefit and role in the network. Read on to learn more.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Juniper Networks, Inc.

Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Rosetta Stone Case Study: Improve Security and Compliance with Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores a threat management that can help you improve security and compliance.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Alert Logic

DDoS Mitigation And DNS Availability Should Be Key Components of Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores an in-depth Forrester survey of 245 IT professionals from enterprises in the US and UK, looking at how they deal with DDoS and DNS security.
Posted: 22 Oct 2014 | Published: 12 Dec 2013

Verisign, Inc.

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk
sponsored by SurfWatch Labs
WHITE PAPER: This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk information, and what cyber insurance options make the most sense for your business.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

SurfWatch Labs
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement