IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats Reports
26 - 50 of 1919 Matches Previous Page  |  Next Page
Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Implement a Proactive Strategy for Data Security
sponsored by IBM
WHITE PAPER: Access this white paper to learn the 5 key findings of a recent Forrester study that evaluated data security decision-making by security buyers and influencers, and what it means to engage in proactive data security and privacy efforts.
Posted: 10 Feb 2015 | Published: 30 Sep 2014

IBM

How Multifunction Printers can Create Unexpected Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

The New Rules of Data Security: Best Practices to Secure Data and Ensure Compliance
sponsored by IBM
VIRTUAL ENVIRONMENT: This virtual environment contains 4 informative webcasts discussing the new rules of data security.
Posted: 09 Feb 2015 | Premiered: 29 Jan 2015

IBM

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

The Top 5 Security Goal Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource distills the reports and opinions of 300 IT decision-makers into a realistic picture of the current state of software security in enterprises across a range of industries.
Posted: 06 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Top Security & Compliance Trends in Innovative Electronic Payments
sponsored by Hewlett-Packard Company
WHITE PAPER: The following research report focuses on the use of electronic payment systems, perceptions about the risk to organizations and trends in the adoption as well as support for virtual currency solutions. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Preventing Data Breaches Made Possible with Data Breach Discovery
sponsored by BitGlass
WHITE PAPER: Consult the following white paper to learn how by using proprietary risk intelligence and Big Data analytics, the Data Breach Discovery system by Bitglass can offer a formidable defense against new age data breaches.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

7 Core Elements Needed in a Solution to Protect Business-Critical Applications
sponsored by Onapsis
WHITE PAPER: This white paper examines the seven core elements needed in a solution to provide comprehensive security for business applications – as well as three elements that are often overlooked by teams but should absolutely be a part of existing security programs.
Posted: 03 Feb 2015 | Published: 03 Feb 2015


Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

Why Fighting Cybercrime Requires Thinking Like the Bad Guys
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll find out how to safeguard your business by changing the way you invest in and think about security – from the perspective of the cyberthreats targeting you.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Hewlett-Packard Company

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett-Packard Company

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 01 Feb 2015 | Published: 20 Jan 2014

Hewlett-Packard Company

Next Generation Network Security: Incorporating Vulnerability Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 01 Feb 2015 | Published: 25 Feb 2014

Hewlett-Packard Company
26 - 50 of 1919 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement