IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Security VulnerabilitiesReports
 
4 Steps to Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this brief whitepaper to find out the four steps to security intelligence.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Hewlett-Packard Company

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

Cisco 2014 Midyear Security ReportĀ - Executive Summary
sponsored by Cisco
WHITE PAPER: Download this exclusive whitepaper now for an overview of the security landscape midway through 2014, including threat intelligence, rising trends, and much more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cisco

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

Evaluating Security Monitoring Alternatives
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper makes a case for adding security monitoring to your protection strategy, detailing its value and comparing some services.
Posted: 27 Oct 2014 | Published: 15 Apr 2008

Symantec Corporation

Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation

Demo: RSA Security Analytics and RSA ECAT
sponsored by RSA
VIDEO: See key features of RSA Security Analytics 10.4 and RSA ECAT 4.0 in action including log collection, packet analysis, the addition of Netflow, and real-time malware analysis on the endpoint.
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement