IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
226 - 250 of 2214 Matches Previous Page  |  Next Page
Cyber Security in the Era of Industrial IoT
sponsored by Bayshore Networks
EGUIDE: Discover how to define, identify, and contextualize security needs in a connected enterprise as IoT becomes a more pervasive and important facet of today's business.
Posted: 22 May 2017 | Published: 22 May 2017

Bayshore Networks

Modern DLP: A Case Study
sponsored by InteliSecure
CASE STUDY: Discover how a well-known cancer research and treatment center successfully deployed a process for implementing and leveraging DLP.
Posted: 22 May 2017 | Published: 22 May 2017

InteliSecure

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Unified Communication: “It should work as easily as a telephone call!”
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 15 May 2017 | Published: 15 May 2017

ComputerWeekly.com

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 11 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Unmasking Subdomain Abuse: How to Protect Against These Stealth Attacks
sponsored by Farsight Security
TRANSCRIPT: Discover how cyber-criminals are increasingly using both legitimate as well as malicious subdomains to gain entry into networks and commit other cyber-crime.
Posted: 08 May 2017 | Published: 03 Feb 2017

Farsight Security

Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Not All Machine Learning Is Created Equal
sponsored by Cylance
WHITE PAPER: Discover how to apply machine learning to your organization's endpoint security and achieve unprecedented efficacy rates, minimal consumption of system resources, exceptional attack prevention speed, and more.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Navigating the NY Dep. of Financial Services' Cybersecurity Regulations
sponsored by Veracode, Inc.
WHITE PAPER: Discover the 5 minimum requirements for NYDFS compliant cybersecurity programs, and what it means that these regulations require each company to assess its specific risk profile and design a program that addresses its risks in a "robust" fashion.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Combating the Top 4 Sources of Vulnerabilities
sponsored by Veracode, Inc.
WHITE PAPER: Vulnerability software is leading to security breaches. Learn how to combat the top four sources of application software vulnerabilities.
Posted: 08 May 2017 | Published: 08 May 2017

Veracode, Inc.

Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

What to Know About SIEM as a Service Before Deployment
sponsored by Splunk
EGUIDE: Access this expert e-guide to learn what would justify a product carrying the "SIEM as a service" label and what characteristics they bear that have contributed to the rising interest in them over the last few years.
Posted: 11 May 2017 | Published: 09 May 2017

Splunk

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black
226 - 250 of 2214 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement