IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
26 - 50 of 2130 Matches Previous Page  |  Next Page
Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

In-Depth Reviews for SIEM Buyers
sponsored by AlienVault
WHITE PAPER: Explore a collection of resources and reports that dive deep into what a SIEM solution needs to provide and how to evaluate the right solution for your organization. Specifically, get an overview and third-party reviews for AlienVault's SIEM platform.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

How to Build a Security Operations Center (on a Budget)
sponsored by AlienVault
WHITE PAPER: In this in-depth guide, get step-by-step instructions on how to create and run an enterprise-level security operations center by combining 4 key ingredients – and without breaking the bank.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

AlienVault

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by Intel Security
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Intel Security

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The Security Balancing Act
sponsored by RES Software
RESOURCE: This infographic explains why taking a people-centric approach to managing security, governance, and identity and access management is the best way to secure and empower the digital workforce. Learn how to provide dynamic security for your productive workforce.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Maintaining Compliance for the Cloud Generation
sponsored by Blue Coat Systems
WHITE PAPER: Learn what regulations govern compliance in the cloud how to maintain them. Access this white paper now to discover the liability companies have from using various cloud apps, what industries are most affected by cloud compliance issues, how to ensure cloud vendors conform to compliance guidelines, and more.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Blue Coat Systems

Protecting Data In The Age of Employee Churn
sponsored by Code42
WHITE PAPER: Learn how the relatively high churn rate of today's knowledge workers, combined with trends like BYOD, puts enterprise data at risk, and how to mitigate it.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Code42

Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015

Code42

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE: The security incident response process must cope with an increasingly constant onslaught of attacks. Learn how to automate and better collaborate your company incident response.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

SearchSecurity.com

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

Insider’s Guide to Defeating Ransomware: Protect Your Data at its Source
sponsored by Imperva
WHITE PAPER: Given the speed at which ransomware impacts organizations, security teams need to detect ransomware at the earliest stage possible. Learn how monitoring access to data on corporate file shares in real time can help you efficiently detect suspicious file modifications, allowing you to detect -- and block -- a ransomware attack.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Imperva

Discover SIEM Capabilities For Real-Time Analysis
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT
sponsored by Forcepoint
TEST RESULTS: Learn how a next-gen firewall can thwart up to 99.9% of attacks – identifying false positives, gaining effective application control, and staying a step ahead of advanced evasion techniques.
Posted: 16 Nov 2016 | Published: 04 Oct 2016

Forcepoint

Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

Web App Firewall Evaluations: Get the Results and Hear Customer Insights
sponsored by Imperva
WEBCAST: This 2016 analysis for web application firewall (WAF) tools reviews 16 vendors and is based on detailed responses to questionnaires from experienced WAF customers. Uncover the experiences of participants in this research, and how they implemented WAF technologies to protect their applications and critical data.
Posted: 15 Nov 2016 | Premiered: Aug 26, 2016

Imperva

Giving IT a Secure, Common Platform for Extending the Data Center to the Cloud
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: IT must tailor security tools to protect public and hybrid cloud environments, allowing the enterprise to confidently extend their data center applications and workflows to the cloud and connect them securely. Access this white paper and uncover secure, dedicated cloud computing services.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Check Point Software Technologies Ltd.

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP

Deliver Instant Web Experiences While Protecting Your Applications
sponsored by Akamai
WHITE PAPER: In this white paper learn how to meet the rising expectations of the always connected, globally-distributed end-users by delivering faster website and mobile app responses. Discover how your enterprise can defend against all types of DDoS and web application attacks at a high accuracy, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

Top 10 Security Advantages of One Business Management Platform
sponsored by Acumatica
RESOURCE: Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Acumatica

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 11 Nov 2016 | Published: 15 Nov 2016

ComputerWeekly.com
26 - 50 of 2130 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement