IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats Reports
151 - 175 of 1994 Matches Previous Page  |  Next Page
Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Case Study: A New Approach to Network Monioring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new approach used by the University of Glasgow to improve network visibility and security wihout adding on appliances. View now to learn how to detect and remedy infected endpoints before disaster occurs and if this strategy if right for your organization.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

Enterprise Security Must Move Beyond Building Protective Walls
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper outlines and explores the six steps of the Attack Life Cycle and takes you into the minds of hackers and cybercriminal teams to help you better craft your security strategy. Read on now to learn how to allocate resources so defenses are most appropriate to the risks.
Posted: 13 Apr 2015 | Published: 08 Apr 2015

Hewlett-Packard Company

A Holistic Approach to Reduce Risk and Improve Mainframe Security
sponsored by IBM
EGUIDE: This extensive technical guide outlines the steps to take to closing mainframe vulnerability gaps. View now to avoid configuring an insecure security strategy.
Posted: 13 Apr 2015 | Published: 04 Dec 2014

IBM

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks

7 ways bots hurt your website
sponsored by Distil Networks
WHITE PAPER: This webcast examines the seven ways that bots can destroy your website and how you can defend yourself against ruin.
Posted: 10 Apr 2015 | Published: 21 Jan 2015

Distil Networks

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
RESOURCE: If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Hewlett-Packard Limited

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

SSL Decryption for Visibility into Emerging Threat Sources
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014

Gigamon

Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security

A Holistic Approach to Fending off Bots and Bot Networks
sponsored by Distil Networks
WHITE PAPER: In this white paper, discover how a cloud-based strategy can block bots in real-time before data and intellectual property theft can occur. View now to learn more.
Posted: 09 Apr 2015 | Published: 04 Feb 2015

Distil Networks

Application Self Defense: Reducing the Impact of High Attack Volume
sponsored by Prevoty
CASE STUDY: This case study outlines how one sports media organization moved beyond threat detection and into real-time prevention against cross-site scripting (XSS), SQLi, and malware attacks. Read on to examine the solution that they chose and if it's right for your organization.
Posted: 09 Apr 2015 | Published: 01 Apr 2015

Prevoty

Keeping Healthcare Data Protected
sponsored by HP Security Voltage
EGUIDE: This expert e-guide lays out the steps to take to align payers and providers to reduce the costs of care and protect sensitive data. Additionally, read on to learn more about the Anthem data breach.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

HP Security Voltage

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

How to Choose A Certificate Authority for Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper sheds light on the seven measures a trustworthy CA needs to take and how to choose a reliable CA.
Posted: 07 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

4 Steps to Simplifying SSL Management
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper outlines the three challenges of SSL certificates and why the ad hoc security approach fails. View now to explore a new approach to simplifying SSL certificate management and reducing complexity in four steps.
Posted: 07 Apr 2015 | Published: 16 Oct 2013

GeoTrust, Inc.

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Choosing the Right Security Solution: Moving Beyond SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.
Posted: 03 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo
151 - 175 of 1994 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement