IT Management  >   Systems Operations  >   Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
Indicators of Compromise
sponsored by IBM
WHITE PAPER: This white paper presents indicators of compromise to look out for and outlines a four-step process for remediating these compromises.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

How to Detect and Defend against Fraudulent Certificates
sponsored by Venafi
EGUIDE: In this expert guide, you'll find tips on detecting and mitigating the fraudulent certificates used by the Flame malware, Zeus, and more.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

Maintaining Compliance vs. Cloud Shadow Data
sponsored by Elastica
WEBCAST: In this webcast, you'll learn the data compliance risks that exist in the cloud and cloud-based apps.
Posted: 09 Sep 2015 | Premiered: Sep 2, 2015


Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Hearts Continue to Bleed: Heartbleed One Year Later
sponsored by Venafi
WHITE PAPER: This white paper discusses why the Heartbleed vulnerability has taken so long to remediate and why you may still be more vulnerable than you think.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


Network Security Breach Detection Test Results
sponsored by Trend Micro
WHITE PAPER: In this white paper, take a look at the test scores of one network security detection strategy as well as its strengths and weaknesses. View now to learn what areas to focus on when ramping up network security.
Posted: 30 Sep 2015 | Published: 24 Aug 2015

Trend Micro

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement