IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats Reports
76 - 100 of 1908 Matches Previous Page  |  Next Page
Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

How to Choose A Certificate Authority for Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper sheds light on the seven measures a trustworthy CA needs to take and how to choose a reliable CA.
Posted: 07 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

4 Steps to Simplifying SSL Management
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper outlines the three challenges of SSL certificates and why the ad hoc security approach fails. View now to explore a new approach to simplifying SSL certificate management and reducing complexity in four steps.
Posted: 07 Apr 2015 | Published: 16 Oct 2013

GeoTrust, Inc.

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

SSL Accerleration Checklist
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores the challenges of SSL management and offers steps to remedy them. Read on to explore the critical requirements checklist for an SSL acceleration platform.
Posted: 06 Apr 2015 | Published: 09 Oct 2013

Blue Coat Systems

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Choosing the Right Security Solution: Moving Beyond SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.
Posted: 03 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Shellshock In Action
sponsored by Trend Micro
VIDEO: In this demonstration video, see the shellshock bug in action and how easy it is for attackers to take advantage of it to gain access to your systems. Discover a technology that adds protection for shellshock bugs by adding an intrusion prevention system in order to protect your systems.
Posted: 01 Apr 2015 | Premiered: 01 Apr 2015

Trend Micro

Self-Assessment: What Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Gartner - Top Security Trends Takeaways for 2013-14 Webinar Slides
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Automating App Blacklisting
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.
Posted: 01 Apr 2015 | Published: 04 Feb 2015

Veracode, Inc.
76 - 100 of 1908 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement