IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsReports
51 - 75 of 1989 Matches Previous Page  | Next Page
Quick Wins with Website Protection Services
sponsored by Akamai Technologies
WHITE PAPER: The following white paper examines the current state of website security and demonstrates the all-too-common error of neglecting security in this realm. Additionally, lean about a website protection solution that can quickly add measurable security to your web presence with a price for enticing than deploying an in-house solution.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This exclusive webcast covers a unified security management platform that will protect your end-users from watering hole attacks.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Risk Management and Security Consulting
sponsored by CDW Corporation
WHITE PAPER: This exclusive whitepaper explores security tests that will help you identify your gaps in security and pick out the threats you are most vulnerable to.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

CDW Corporation

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data
sponsored by BitGlass
WHITE PAPER: This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box with the security and compliance of a private cloud.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Free Product Demo: How to Keep All Your Systems Safe and Up-to-Date
sponsored by Shavlik Technologies
PRODUCT DEMO: This free product demo covers a solution that will keep all of your systems up-t
Posted: 06 Oct 2014 | Premiered: 06 Oct 2014

Shavlik Technologies

“The Russian Password “Store” – 1.2 Billion Reasons to Be Concerned about Security, or Ho-Hum
sponsored by CDW Corporation
RESOURCE: This resource stresses the importance of staying on top of data security, as well as identity and access control.
Posted: 03 Oct 2014 | Published: 20 Aug 2014

CDW Corporation

What You Need for an Effective HIPAA Security Risk Assessment
sponsored by CDW Corporation
RESOURCE: An in-depth look inside the 4 key components of a top-notch security risk assessment.
Posted: 03 Oct 2014 | Published: 14 Aug 2014

CDW Corporation

Security Assessment Team Helps Hospital Revamp their Security Infrastructure
sponsored by CDW Corporation
VIDEO: Find out what a security assessment team found after evaluating a hospital's security infrastructure, policies and procedures.
Posted: 02 Oct 2014 | Premiered: 02 Oct 2014

CDW Corporation

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Cloud Adoption in Asia Pacific: Overcoming Security Concerns with SSL
sponsored by Symantec Corporation
WHITE PAPER: Cloud computing offers unprecedented opportunities for businesses to cut IT costs while improving their ability to respond to changing strategic demands. Concerns about security, however, are a barrier to adoption.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

How Executives Can Understand Cyber Risks and Ensure Governance
sponsored by SurfWatch Labs
WHITE PAPER: Learn about today's cyber security risks and how to incorporate a sound cyber risk framework based on a business intelligence approach.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SurfWatch Labs

Ensuring Compliance in the Asia Pacific Region with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Doing business in Australia, New Zealand, Singapore, or other parts of the Asia Pacific region means one key concern – privacy. This informative resource considers threats to privacy, essential encryption, and SSL certificate best practices.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Symantec Corporation

Website Security Threat Report 2014 - Part 2
sponsored by Symantec Corporation
WHITE PAPER: Consult this resource to learn more about the growing threat landscape. The data was collected and analyzed by Symantec's security experts.
Posted: 01 Oct 2014 | Published: 30 Sep 2014

Symantec Corporation

Nasty Shadow IT Surprises for the Enterprise
sponsored by CipherCloud
RESOURCE: Check out this resource to learn about three shadow IT surprises that are capable of affecting your business.
Posted: 01 Oct 2014 | Published: 08 Sep 2014

CipherCloud

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

How Much Cybersecurity is Enough?
sponsored by CDW Corporation
TRANSCRIPT: In this presentation, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CDW Corporation
51 - 75 of 1989 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement