IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security Reports
151 - 175 of 3538 Matches Previous Page  |  Next Page
IOT Botnets & DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding for DDoS mitigation best practices and learn how to prevent the growth of IoT botnets.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

Does Your Mobile Anti-Virus App Protect or Infect You? The truth behind DU Antivirus Security
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Instead of protecting user data, DU Antivirus Security, did just the opposite. Instead of encrypting data, they used private information for commercial purposes without permission. Go inside to learn more about how DU Antivirus Security works, and how you can take steps to avoid other malicious apps like it in the future.
Posted: 20 Oct 2017 | Published: 18 Sep 2017

Check Point Software Technologies Ltd.

Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016

Check Point Software Technologies Ltd.

DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
RESEARCH CONTENT: In this Frost & Sullivan research report, learn about the growing threat of IoT-based DDoS attacks and see how many organizations are defending against them.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks

Möbius Partners Helps Rent-A-Center Transform IT by Deploying a Software Defined Data Center
sponsored by Mobius Partners
VIDEO: Rent-A-Center was struggling to deploy thousands of virtual machines at a time for stores across the United States. Take 3 minutes to learn about a platform that enabled Rent-A-Center to accomplish all of this, gaining the ability to manage the virtual infrastructure, as well as automate, manage and control provisioning.
Posted: 20 Oct 2017 | Premiered: 29 Feb 2016

Mobius Partners

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals 5 FAQs to help banking organizations make smart decisions when evaluating mobile banking security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

3 Types of SSL Certificates
sponsored by HID Global
RESOURCE: Are you making the right choice when it comes to your SSL certificate? Take a look at this resource to gain insight into 3 types of SSL certificates to see if you are making the right choice specific to your business.
Posted: 20 Oct 2017 | Published: 13 Jul 2017

HID Global

A Smarter Approach For Combating Distributed Denial-of-Service Attacks
sponsored by Windstream Communications
RESOURCE CENTER: In this article, learn how to build a modernized DDoS mitigation strategy for your organization without compromising network performance and reliability.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Windstream Communications

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

TOPICS:  Security
Google Cloud

"The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.
Posted: 19 Oct 2017 | Published: 11 Aug 2017

Check Point Software Technologies Ltd.

Learn How You can Simplify Mobile Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.
Posted: 19 Oct 2017 | Published: 13 Jul 2017

Check Point Software Technologies Ltd.

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

PCI Compliance with Unified Security Management
sponsored by AlienVault
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

How To Become A Superstar Security Leader
sponsored by Google Cloud
ANALYST REPORT: As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.
Posted: 18 Oct 2017 | Published: 13 Feb 2017

Google Cloud

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

From HummingBad to Worse: The History of the Yingmob
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.
Posted: 18 Oct 2017 | Published: 30 Dec 2016

Check Point Software Technologies Ltd.

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The Mobile Banker Threat - from End to End
sponsored by Check Point Software Technologies Ltd.
RESOURCE: This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.
Posted: 17 Oct 2017 | Published: 17 May 2017

Check Point Software Technologies Ltd.

ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017

Check Point Software Technologies Ltd.

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas
151 - 175 of 3538 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement