IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
51 - 75 of 2319 Matches Previous Page  |  Next Page
Add-ons Secure Office 365 from Advanced Attacks
sponsored by OPSWAT inc
EGUIDE: Microsoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection.
Posted: 31 Aug 2017 | Published: 30 Aug 2017


Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017


A Closer Look Into 2016 Data Breaches
sponsored by IBM
RESEARCH CONTENT: This 30-page report reveals the impact of 2016 data breaches, including insights into how data leaks shaped global politics and presidential elections. Learn how to apply lessons learned from last year to protect your organization this year.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

IBM

Cost of Data Breach Study: United States
sponsored by IBM
RESEARCH CONTENT: The average cost for each lost or stolen record containing sensitive and confidential information increased from $217 to $221, according to the Ponemon Institute. Access this study for a look into the cost of data breach incidents in the United States.
Posted: 31 Aug 2017 | Published: 30 Jun 2016

IBM

Moving from Vulnerability Management to Effective Vulnerability Response
sponsored by ServiceNow
WEBCAST: Watch this webcast to uncover how Seton Hall University went from using spreadsheets for tracking vulnerability information to a new approach to vulnerability response.
Posted: 31 Aug 2017 | Premiered: Jul 11, 2017

ServiceNow

So You've Been Breached: What to Do Next
sponsored by Armor
WHITE PAPER: When your system is breached by a malicious attack, it's no time to panic, it's time to act. Inside, discover the 5 steps you need to take to stop the exfiltration of data and return your system to normal operations with as minimal damage as possible.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Armor

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Secure Your Endpoint Devices With A Unified Endpoint Management Tool: IBM MaaS360 with Watson Overview
sponsored by IBM
PRODUCT OVERVIEW: Today's end-user devices are comprised of all form factors— everything from smartphones and tablets to laptops and desktops. IT faces the challenge of monitoring, securing and managing all of these end-user devices successfully. Learn how IBM® MaaS360® with Watson™, a cognitive unified endpoint management (UEM) tool, can help overcome this hurdle.
Posted: 30 Aug 2017 | Published: 01 Apr 2017

IBM

5 Reasons to Choose Dell EMC for Data Protection
sponsored by Dell EMC and Intel®
RESOURCE: Download this resource to get an overview of Dell EMC's data protection portfolio, including five foundational features that ensure you'll meet all of your data protection requirements.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

How to Block Malicious File Uploads
sponsored by OPSWAT inc
WHITE PAPER: File uploads offer an attack vector to cybercriminals. This white paper describes the best ways to prevent malicious file uploads and the keys to protecting your sensitive data.
Posted: 29 Aug 2017 | Published: 29 Aug 2017


'Hacking with Pictures': Stegosploit and How to Stop It
sponsored by OPSWAT inc
TECHNICAL ARTICLE: Take a closer look into Stegosploit, a type of malware that is inserted into certain extra-data sections of an image. Learn how image-borne malware works, which image formats can carry Stegosploit, and how to remove it.
Posted: 29 Aug 2017 | Published: 02 Aug 2017


Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Network Visibility for Dummies
sponsored by Ixia
EBOOK: You can't monitor what you can't see. When it comes to establishing strong security, visibility across all your network traffic is essential. This 77-page e-book, Network Visibility for Dummies, describes how you can achieve truly resilient and effective network security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

Data Breach Digest: How to Prevent, Respond & Move On From Potential Data Breach Security Issues
sponsored by Verizon
RESEARCH CONTENT: Data breaches are complex affairs that can lead to dire results. But they aren't just an IT security problem – they're a business problem too. In this comprehensive 100-page report, learn about various data breach security scenarios to understand how to prevent, respond, and move on successfully.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

Verizon

Build Your Identity and Access Management Strategy
sponsored by RSA
RESEARCH CONTENT: This Forrester Research report provides guidance for the development of a compelling and successful identity and access management strategic plan.
Posted: 23 Aug 2017 | Published: 03 Apr 2017

RSA

2017 Data Breach Digest Update: The Insider Threat
sponsored by Verizon
RESEARCH CONTENT: Who are the targeted industries for insider and privilege misuse? This 2017 Data Breach Digest update by Verizon reveals the top 3 industries at risk. Discover advice and insights to mitigate insider threats.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

Verizon

Turn Intelligence Into Action for Strong Cyber Resilience
sponsored by Verizon
WHITE PAPER: Cyberattacks continue to grow more frequent and sophisticated. Can you keep up? In this brief resource, take a closer look at cyber threat detection and response tools that can help you quickly respond to potential threats.
Posted: 23 Aug 2017 | Published: 23 Aug 2017

Verizon

Protecting Data in the Healthcare Industry
sponsored by Mimecast
RESEARCH CONTENT: The large amount of personal information held by healthcare providers and hospitals make them ideal targets for cyberattack (especially from rogue employees). Read on to learn the history of compliance regulations, how current IT trends have increased risks (such as data theft), and what can be done to prevent data theft, fraud and more.
Posted: 21 Aug 2017 | Published: 31 Jul 2017

Mimecast

Security Tech: Out with the Old in with the New
sponsored by Citrix
RESOURCE: Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Stop Ransomware in its Tracks
sponsored by Cisco Umbrella
RESOURCE CENTER: In this resource center, explore the many facets of ransomware through several available resources and even enjoy a little embed game to lighten the mood.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Cisco Umbrella

Taking Managed Services to the Next Level
sponsored by Datto, Inc.
EBOOK: As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Datto, Inc.

How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.
51 - 75 of 2319 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement