IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Security Vulnerabilities Reports
 
2016 Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Case Study: Reclaiming Website Security and Control
sponsored by Neustar
WHITE PAPER: Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER: This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014

Symantec Corporation

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement