IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
51 - 75 of 2254 Matches Previous Page  |  Next Page
Data Protection: Not Just About Personal Data and Compliance
sponsored by Arrow + NetApp
EGUIDE: Despite the focus on data protection, many organizations are still leaving their data wide open for attack. Access this e-guide now to learn if a cloud-based data storage and protection strategy works and is right for you.
Posted: 18 May 2017 | Published: 18 May 2017

Arrow + NetApp

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Choosing an Optimal Solution for DDoS Protection
sponsored by Radware
WHITE PAPER: Discover which cloud-based DDoS protection could work best for your organization, including on-premise, on-demand, always-on, and hybrid cloud options.
Posted: 17 May 2017 | Published: 17 May 2017

Radware

How to Deliver Comprehensive, End-to-End Mobile Security
sponsored by Citrix
WHITE PAPER: Learn how EMM could be your key to managing personal devices in a corporate setting at scale – without impacting user experience, and without inflating costs or introducing security risks.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Discover recommendations towards a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Access now for the 4 key steps to kidnap-proof your data.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

The Current State of Email Security
sponsored by Microsoft
WHITE PAPER: Explore email security threats' most common delivery methods and ID their risks to your organization. Also uncover effective remedies to both internal and external threats and how to implement them.
Posted: 17 May 2017 | Published: 17 May 2017

Microsoft

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Global Study on Compliance Challenges & Security Effectiveness
sponsored by Citrix
RESEARCH CONTENT: In this Ponemon Institute research report, discover the risks created by compliance with regulations, especially compliance with the EU's General Data Protection Regulations (GDPR).
Posted: 16 May 2017 | Published: 31 Mar 2017

Citrix

The Need for a New IT Security Architecture: Global Study
sponsored by Citrix
RESEARCH CONTENT: In this Ponemon Institute report, discover an analysis of the risks created by cybercrime, employee negligence, and organizational dysfunctions. Uncover the tech your peers believe are most effective at dealing with these risks.
Posted: 15 May 2017 | Published: 15 May 2017

Citrix

Global Study on the Risk of Outdated Technologies
sponsored by Citrix
WHITE PAPER: Discover global trends in IT security risks and reasons why security practices and policies need to evolve to deal with threats from disruptive technologies, insider risk and compliance.
Posted: 15 May 2017 | Published: 28 Feb 2017

Citrix

Unified Communication: β€œIt should work as easily as a telephone call!”
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 15 May 2017 | Published: 15 May 2017

ComputerWeekly.com

How to Secure Office 365 from Advanced Attacks
sponsored by Microsoft
EGUIDE: This e-guide details how to protect Office 365 from phishing attempts, defend end users from malicious sites, and more.
Posted: 12 May 2017 | Published: 12 May 2017

Microsoft

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 11 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

How Technology helps with the reporting burden-KPMG
sponsored by Tagetik Software
WHITE PAPER: Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM.
Posted: 11 May 2017 | Published: 11 May 2017

Tagetik Software

Understanding and Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more.
Posted: 11 May 2017 | Published: 11 May 2017

Dyn

Your Guide to Secure ESFF File Sharing
sponsored by BlackBerry
WHITE PAPER: Discover how EFSS can fulfill the needs of employees who want seamless mobile collaboration and to leverage tech to increase productivity, while also allowing IT to protect sensitive information and help the company embrace innovative new technology that can deliver on key business goals.
Posted: 11 May 2017 | Published: 11 May 2017

BlackBerry

Advanced Security Analytics Safeguards the Enterprise
sponsored by Splunk
EGUIDE: Learn the position of advanced security analytics in today's modern enterprise as well as what types of products fall into this category, how they interact with other products, and more.
Posted: 10 May 2017 | Published: 09 May 2017

Splunk

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Fortinet Ransomware Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 09 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

What to Know About SIEM as a Service Before Deployment
sponsored by Splunk
EGUIDE: Access this expert e-guide to learn what would justify a product carrying the "SIEM as a service" label and what characteristics they bear that have contributed to the rising interest in them over the last few years.
Posted: 11 May 2017 | Published: 09 May 2017

Splunk
51 - 75 of 2254 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement