IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
201 - 225 of 2130 Matches Previous Page  |  Next Page
Focusing on Application Security is More Important than Ever
sponsored by Onapsis
EGUIDE: This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.
Posted: 13 Sep 2016 | Published: 09 Sep 2016

Onapsis

How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

SANS Analytics and Intelligence Survey
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: A recent SANS Security Analytics & Intelligence Survey found that organizations are still met with security challenges, like quickly responding to threats, proper implementation and use of analytics tools and more. Access the full survey report to get a more detailed view of changing security analytics trends.
Posted: 07 Sep 2016 | Published: 30 Nov 2015

LogRhythm, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

Federal Agencies Have a BYOD Program, Like It or Not
sponsored by Lookout
RESEARCH CONTENT: Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond
sponsored by Lookout
WHITE PAPER: Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

SIEM Software Gives Companies Insight into Both Security and Business Operations
sponsored by LogRhythm, Inc.
WHITE PAPER: SIEM software has come a long way in the past decade, and continues to prove its worth by evolving to rise up against cybercrime. Access this resource to learn more about the increasing effectiveness of SIEM tools.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

LogRhythm, Inc.

Incident Response Capabilities in 2016
sponsored by LogRhythm, Inc.
WHITE PAPER: As the attacker's landscape has changed, organizations have started to respond and are realizing they must respond quickly. Discover how the results of a 2016 incident response survey show a need for more efficient incident response teams, and learn what you can do to improve yours.
Posted: 01 Sep 2016 | Published: 30 Jun 2016

LogRhythm, Inc.

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper uncover everything you need to know to transition to the cloud seamlessly. Learn about the shift in workloads, the evolution in the security stack, the challenges of deep visibility, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

A case study in critical infrastructure interdependency
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

The Practical Guide to Enterprise Mobile Security
sponsored by Lookout
ESSENTIAL GUIDE: Access now to help security and IT managers fulfill their dual (and evolving) role of both enabling end-user and device productivity while reducing risk through the adoption of modern-enterprise mobile security practices.
Posted: 31 Aug 2016 | Published: 31 May 2016

Lookout

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

DR Tabletop Testing Simulator
sponsored by Databarracks
ASSESSMENT TOOL: Explore three disaster scenarios and answer the provided questions to reveal the appropriate recovery steps for each situation.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Databarracks

Computer Weekly – 30 August 2016:Get protected
sponsored by ComputerWeekly.com
EBOOK: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlight the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 Research report excerpt, explore the implications of applied behavior analytics (ABA) on today's security landscape. Learn about the ABA market, the different types of behavior analytics, insider monitoring systems and more. Plus, get recommendations on how you can proceed with ABA.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This easy-to-follow guide takes you through the 11 steps that enterprises can take in order to learn, not only the benefits, but how to mitigate the dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

Market Overview and Analysis: Security Information and Event Management
sponsored by IBM
RESEARCH CONTENT: The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. This report by Gartner examines and compares the top 14 SIEM vendors, sharing the strengths and weaknesses of each vendor so that you can better navigate the market.
Posted: 29 Aug 2016 | Published: 10 Aug 2016

IBM

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout
201 - 225 of 2130 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement