IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats Reports
Stop Malware Attacks Before They Strike With This Network Threat Analytcs Module
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how LogRhythm's Network Threat Analytics module can help you detect, prioritize, and neutralize cyber threats before they attack. Learn how you can immediately detect botnets and other malware, quickly identify disguised data transfers, and more.
Posted: 10 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Read on to uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Are Your Printers Vulnerable to Attack?
sponsored by HP
RESOURCE CENTER: This web page features a questionnaire that will let you know if your networked printers are currently vulnerable to attack. Also, you will learn about printer security focus areas and a tool that reveals the range of printer security options now available.
Posted: 24 Oct 2016 | Published: 31 Aug 2016


Are You Ready for RASP?
sponsored by
EBOOK: This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016

The Current and Future States of Cybersecurity in the Digital Economy: Part 3
sponsored by Unisys
WHITE PAPER: In the 3rd and final part of this report: explore security and privacy considerations of IoT, consider public awareness and education as strategies for enhancing readiness and security, and learn about the latest trends in cybersecurity.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


DNS Co-Founder Discusses the Need for a More Secure DNS
sponsored by Dyn
EGUIDE: This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.
Posted: 24 Oct 2016 | Published: 20 Oct 2016


It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

10 Principles of Database Security Program Design
sponsored by Trustwave
WHITE PAPER: Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.
Posted: 03 Oct 2016 | Published: 31 Dec 2015


DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016


Shadow Data Report: Cloud Apps and Services Adoption, Use, and Threats
sponsored by Symantec + Blue Coat
WHITE PAPER: In this shadow data report, you'll uncover a multilayered data science approach to identifying malicious cloud-related activity. Learn how you can leverage machine learning and computational analysis to detect suspicious user behavior.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement