IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 
Definition continues below.
Security Threats Reports
51 - 75 of 2082 Matches Previous Page  |  Next Page
How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014


The Bad Guys are Already In: 5 Steps to Defend against Cybercriminals
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to build a security strategy based around the assumption that "the bad guys are already in." Read on to see five recommendations for implementing this strategy.
Posted: 04 Nov 2015 | Published: 14 Sep 2015


20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


CISOs: Dos and Don'ts for Incident Response Management
sponsored by IBM
EGUIDE: This two-part guide includes an in-depth interview with corporate attorney and cybersecurity insider Chris Pierson on incident response planning and the role that a CISO should play. Next, IT service providers will uncover vital information on protecting SMB customers from sophisticated cyberattacks.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


6 Key Security Transformations for Protecting Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper examines the six areas of cybersecurity that most need to transform if your business is going to stay secure in today's threat environment.
Posted: 03 Nov 2015 | Published: 30 Sep 2015


Secure Unified Access for the Distributed Enterprise
sponsored by Fortinet, Inc.
RESOURCE: Discover how to implement a unified access solution, in which comprehensive, multi-layered security extends automatically with each new network connection, wired or wireless. Access 5 key considerations for implementing this unified layer for your wireless security.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Five Reason to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This resource presents the top five benefits you can enjoy by adopting an MSSP. Find out what an MSSP can offer you and decide if an MSSP is the right solution to your cybersecurity dilemma.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Avoid BYO Policy and Security Pitfalls By Addressing Mobile Threats
sponsored by Citrix
WHITE PAPER: This white paper highlights the legal risks of personally owned technology, and offers policy recommendations and mitigating technology solutions to protect business information. Examine 5 practical case studies to help you recognize and address potential threats from using personal devices at work.
Posted: 28 Oct 2015 | Published: 30 Sep 2014


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

Cyberthreat Defense in 2015
sponsored by Citrix
RESOURCE: This short infographic reveals survey results that all IT security professionals will be interested in reviewing.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


5 Network Security Lessons We Should All Learn from the Sony Hack
sponsored by Trend Micro
EGUIDE: Access this expert guide now to uncover the 5 enterprise network security lessons that could have helped Sony Pictures Entertainment to avoid its data breach fate, from treating APTs seriously to getting the right executives on board.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Trend Micro

Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Safeguard Your Financial Information with a Complete Governance Framework
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper explains how to reduce the risk associated with exchanging financial information between the corporation and outside auditors. Learn how to secure your finance team and maximize your productivity with insight into key transactions.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

IntraLinks, Inc

Growing Cyber Threats Challenging Cost Reduction as Reason To Use Managed Services
sponsored by IBM
EGUIDE: This expert guide delves deeper into the results of a recent survey finding that over a third of IT operations in mid-sized companies will make the move to an outsourced managed service over the next 5 years as IT directors chase greater security and reduced costs.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

51 - 75 of 2082 Matches Previous Page    1 2 3 4 5 6    Next Page
SECURITY THREATS DEFINITION (continued): …  a vulnerability by some people but not by others.CVE was developed and is maintained by the MITRE Corporation to facilitate the sharing of data among diverse security interests. It can simplify the process of searching for information in security-related databases and on the Internet. The dictionary is the product of collaboration among experts and representatives from security-related organizations worldwide. Items in CVE are given names according to the year of their formal inclusion and the order in which they were added to the list in that year. For example, CVE-2002-0250 refers to a specific … 
Security Threats definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement