IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat Mitigation Reports
Are Cybercriminals Hiding in Your SSL Traffic?
sponsored by Venafi
WHITE PAPER: This white paper examines how hackers can hide their exploits in encrypted SSL traffic and suggests ways you can stop them.
Posted: 10 Sep 2015 | Published: 10 Sep 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

How Insecure Keys and Certificates Can Put You at Risk
sponsored by Venafi
WHITE PAPER: This white paper describes how hackers use insecure keys and certificates to compromise a network and gives you tips on making yours more secure.
Posted: 09 Sep 2015 | Published: 09 Sep 2015


Service Providers: Meeting Security Demands of Auditors and Customers
sponsored by Earthlink.
CASE STUDY: In this white paper, take a look at how Pay Human Group, a leading global payroll and HR provider, outsourced their data center to meet customer and auditor security demands.
Posted: 17 Sep 2015 | Published: 22 Jul 2015


Protecting Your Data in Office 365
sponsored by Elastica
WEBCAST: This webcast examines Shadow Data and the security vulnerabilities it opens for IT
Posted: 08 Sep 2015 | Premiered: Aug 12, 2015


Top 5 Cloud Data Protection Challenges. Solved
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 28 Sep 2015 | Published: 24 Aug 2015


Understanding the Risks of Content Management Systems
sponsored by IBM
WHITE PAPER: This white paper explores the dangers of CMS platforms and explains how you can take advantage of CMS without putting your security at risk.
Posted: 11 Sep 2015 | Published: 31 May 2015


Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement