IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Teardrop Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Teardrop AttacksReports
 
Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Cyber Risk Perceptions: An Industry Snapshot
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER: This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011

Neustar®

Malware Attacks Demand a New Malware Defense Approach
sponsored by Imperva
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Imperva

Comprehensive Protection for Email and Web: The World's Most Critical Business Applications
sponsored by Fortinet, Inc.
WHITE PAPER: Email and the web have revolutionized business communication, providing an unmatched blend of reach, scalability, timeliness, efficiency and overall effectiveness.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Posted: 19 Aug 2009 | Published: 03 Aug 2009

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement