IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats Reports
 
Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

What Trust Can Mean to Your Enterprise's Cloud Policy
sponsored by Entrust, Inc.
ANALYST REPORT: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Entrust, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security as it stands today and what organizations need to do to secure the most oft-attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE: The security incident response process must cope with an increasingly constant onslaught of attacks. Learn how to automate and better collaborate your company incident response.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

SearchSecurity.com

Endpoint Security for the Empowered Enterprise
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This resource examines endpoint protection features that improve system performance and user productivity. Uncover Dell's Endpoint Security Suite Enterprise, how it supports encryption and advanced authentication, and the technical specifications required.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Unified Insights on One Unified Threat Management Market Product
sponsored by WatchGuard Technologies, Inc.
EGUIDE: This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.
Posted: 16 Jan 2017 | Published: 13 Jan 2017

WatchGuard Technologies, Inc.

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

How to Keep Your Organization Safe from Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how to defend against advanced malware, analyze a wide range of file types, and utilize a flexible architecture to block network threats while optimizing performance. Access now to uncover how to not only know what's happening on your network at all times, but also leverage rich reporting and monitoring.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement