IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
101 - 125 of 2004 Matches Previous Page  | Next Page
Context-Aware Vulnerability Management: The Basics
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines the benefits of context-aware vulnerability management solutions, and if it is the right security solution for your organization.
Posted: 01 Aug 2014 | Published: 31 Jan 2014

BeyondTrust Corporation

Next Generation Firewall Solutions Aid Research-oriented Institutions
sponsored by McAfee, Inc.
CASE STUDY: Access this case study to learn about a university that used a next generation firewall solution for complete network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

Unseen Challenges in Protecting Corporate Credentials
sponsored by IBM
WEBCAST: Tune in to this critical webinar to hear Eve Maler, Principal Analyst at Forrester Research, Inc., and Trusteer's Christopher Beier expose the common mistakes that cause corporate credential breaches, and explain how you can better fortify your employee's credentials against these attacks.
Posted: 01 Aug 2014 | Premiered: Mar 13, 2014

IBM

Stopping Zero Day Exploits For Dummies
sponsored by IBM
EBOOK: This informative eBook examines the different threats that could compromise your security system and lead to advanced persistent threats and targeted attacks, and outlines the best strategies to keep your data safe.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

Network Evolution – July/August 2014
sponsored by SearchNetworking.com
EZINE: Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchNetworking.com

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: In this white paper, you'll learn the basics of how malware works and how cyber criminals use it to steal valuable data, as well as the best practices for defending your website against them.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

Don't Be Fooled By Advanced Evasion Techniques
sponsored by McAfee, Inc.
WHITE PAPER: In informative white paper, get the lowdown on advanced evasion techniques (AETs) and advanced persistent threats (APTs), and what you need to know to protect your organizations from these cyber attacks.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

McAfee, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Best practices for securing mobile email access
sponsored by Hewlett-Packard Limited and Intel ®
EGUIDE: As companies continue to encourage and enable their employees to work remotely, accessing email and information on Exchange servers in a secure environment is not always easy. A secure connection is necessary in order to guarantee there will be no consequences for a potential threat or attack.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited and Intel ®

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Real-World Security Testing: Why Industry Experts Say it's Essential
sponsored by Fortinet, Inc.
WEBCAST: Tune in to this webinar to separate the facts from hype as industry experts examine how organizations can best bolster their IT defense, and why real-world testing is a critical part of any security solution. W
Posted: 31 Jul 2014 | Premiered: May 7, 2014

Fortinet, Inc.

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Scaling Analytics to Meet Real-Time Threats in Large Enterprises
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper summarizes a comprehensive validation lab test recently performed by the SANS Institute on LogRhythm's security analytics platform.
Posted: 31 Jul 2014 | Published: 30 Sep 2013

LogRhythm, Inc.

The new reality of mobile solutions: Everything you’ve been told about mobility is wrong
sponsored by Dell, Inc.
WHITE PAPER: This white paper breaks down four huge misconceptions about mobility that is scaring organizations away from going mobile. It also provides ways to easily overcome any barriers to mobility across your organization by objectively matching the best mobility strategy to your unique IT requirements, business goals and user group needs.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc.

BlackBerry COBO: Ultimate Mobile Security and Control
sponsored by BlackBerry
WHITE PAPER: When security and control are of paramount concern a COBO option can provide optimal protection against data loss and strict compliance with regulatory requirements. Read this whitepaper if you want to know your high-security users are equipped with mobile computing and communications capabilities that meet your corporate-only requirements.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

BlackBerry

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Advanced Evasion Techniques For Dummies
sponsored by McAfee, Inc.
EBOOK: In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.
101 - 125 of 2004 Matches Previous Page    3 4 5 6 7 8    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement