IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
101 - 125 of 1995 Matches Previous Page  | Next Page
The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Does Your SIEM Integrate Threat Data?
sponsored by CDW Corporation
WHITE PAPER: This expert eGuide explores how new technologies are integrating threat intelligence into SIEM solutions and enabling organizations to better prioritize security controls.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Threat-Aware Identity and Access Management for Mobile, Cloud, and Enterprise
sponsored by IBM
WHITE PAPER: This informative white paper presents new identity and access management (IAM) solutions with integrated threat prevention and analysis, increased granularity, and simplified user interfaces and dashboards.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

IBM

How to easily secure all of your Windows, Mac, and mobile devices through the cloud
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Click here to test out Sophos cloud for 30 days. With no server to install, you'll be up and running in less than 5 minutes. Learn how this platform will quickly and easily secure all your Windows, Mac and mobile devices through the cloud.
Posted: 17 Sep 2014 | Premiered: 17 Sep 2014

Sophos, Inc.

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce
sponsored by Absolute Software
CASE STUDY: This case study reveals how Intelligrated found a solution that would allow them to track and secure laptops in the field, in order to avoid any potential laptop theft.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Anatomy of a Cyber-Attack: How Cyber Criminals Operate, and How You Can Stop Them
sponsored by Icomm Technologies
WHITE PAPER: In this informative resource, get an inside look the basic steps of a cyber-attack, from reconnaissance to intrusion to malware insertion, as well as new integrated security solutions that can help prevent these malicious activities from disrupting your business.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

Icomm Technologies

Get Unprecedented Visibility, Control, and Policy Creation Options with Encrypted Traffic Management
sponsored by Blue Coat Systems
RESOURCE: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Improve Your Security in 30 Days with HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
sponsored by Intel Security
WHITE PAPER: SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

SIEM: Keeping Pace with Big Security Data
sponsored by Intel Security
WHITE PAPER: This detailed report explores how intelligent and scalable Security Information and Event Management (SIEM) solutions can help you stay on top of an ever-evolving, data-driven environment.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Intel Security

Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

Tackling Web Security Head On
sponsored by Cisco
WHITE PAPER: This white paper reveals a solution to tackle web security—blocking hidden malware and high-risk sites before it affects users.
Posted: 09 Sep 2014 | Published: 30 Sep 2013

Cisco

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
101 - 125 of 1995 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement