IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
51 - 75 of 2030 Matches Previous Page  | Next Page
How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

TaaSera

SIEM Missteps? Tips to Help You Move Forward
sponsored by LogRhythm, Inc.
PODCAST: Download this expert podcast now to learn about key pitfalls you must avoid to find value in your security information and event management deployment at different maturity levels.
Posted: 02 Dec 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TaaSera

Security Best Practices for a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper presents a straightforward approach to cloud security that enables your enterprise to mitigate the risks associated with cloud deployment and usage; improve and standardize your security posture and practices across all environments; and more.
Posted: 01 Dec 2014 | Published: 31 Jul 2014

IBM

Getting IT Security Wrong Can Be Costly—How to Balance Investment with Risk
sponsored by Clearswift
WHITE PAPER: This white paper examines why so many executives take little interest in information security; why compliance needs to be combined with a more risk-based approach to security; the importance of creating a security-aware culture; and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Clearswift

Customer Spotlight: Deploying a Data Protection Program in Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 26 Nov 2014 | Premiered: Nov 5, 2014

Digital Guardian

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Major Digital Entertainment Business Protects Hundreds of Artist Websites with CloudPassage Halo
sponsored by CloudPassage
CASE STUDY: In this case study, learn how a major digital entertainment business protects hundreds of artist websites with software-defined security delivered in a SaaS model with cost-effective, metered-based pricing.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: Download this exclusive white paper now to learn about three security ratings that can help you identify, quantify, and mitigate risk throughout your environment.
Posted: 25 Nov 2014 | Published: 15 Apr 2014

BitSight

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Top Tips for Time Stretched Admins
sponsored by ControlNow
WHITE PAPER: This guide provides time-saving tips that IT admins at smalland mid-sized companies can use to stay on top of theirworkloads, keep systems running and protected, and maintaina healthy work/life balance.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

SIEM missteps? Tips to Help you move Forward
sponsored by LogRhythm, Inc.
WEBCAST: Download this expert webcast now to learn about implementing the necessary practices for effective security information and event management use.
Posted: 24 Nov 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Stuck in a SIEM Rut?
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will help you make sure your security information and event management solution is improving your security posture.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.

The Internet of Things: A CISO and Network Security Perspective
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.
Posted: 24 Nov 2014 | Published: 14 Oct 2014

Cisco

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
51 - 75 of 2030 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement