IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
26 - 50 of 2138 Matches Previous Page  |  Next Page
Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

A Certified Concern
sponsored by SearchSecurity.com
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016

SearchSecurity.com

Who Will CAVE First: Likely Targets of Ransomware
sponsored by Radware
WHITE PAPER: The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

IoT: Internet of Things or Internet of Threats?
sponsored by Radware
WHITE PAPER: This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

NSS Labs 2016 Breach Detection System (BDS) Group Test Results
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.
Posted: 21 Sep 2016 | Published: 01 Aug 2016

Fortinet, Inc.

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

The Enterprise Network Firewall Market
sponsored by Fortinet, Inc.
ANALYST REPORT: Discover how NGFWs have added new features, what roles they play in network security functions today, and what place they have in future security developments. Also learn the strengths of specific NGFWs, as well as cautions for their use.
Posted: 19 Sep 2016 | Published: 25 May 2016

Fortinet, Inc.

Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Radware

How GuideStar Stabilized Website Availability by Blocking Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

Give Your Threat Counter-Measures a Shot in the Arm
sponsored by Fortinet, Inc.
WHITE PAPER: Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Fortinet, Inc.

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

SHA-1 is Dead. Long live SHA-2!
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: Discover how to quickly and effectively implement a SHA-1 depreciation plan to ensure that every certificate in your organization is based on the new SHA-2 algorithm. Learn why SHA-1 is out, the reasons behind deprecation timing, and best practices and resources for your SHA-2 migration.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Certified Security Solutions (CSS)

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Uncover how to effectively plan for your enterprise's adoption of Office 365, and run through a comprehensive step-by-step to build your cloud "to-do" list.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

How Glassdoor Blocks Unwanted Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how Glassdoor ensured their site metrics by proactively reducing bad bot traffic. Discover how they implemented a proactive (and not after-the-fact) strategy, ensured 99.9% of advertising platform traffic comes from real humans, and avoided driven up infrastructure costs.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Distil Networks

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)
26 - 50 of 2138 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement