IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
ThreatsReports
 
Ensuring Compliance in the Asia Pacific Region with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Doing business in Australia, New Zealand, Singapore, or other parts of the Asia Pacific region means one key concern – privacy. This informative resource considers threats to privacy, essential encryption, and SSL certificate best practices.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Symantec Corporation

Risk Management and Security Consulting
sponsored by CDW Corporation
WHITE PAPER: This exclusive whitepaper explores security tests that will help you identify your gaps in security and pick out the threats you are most vulnerable to.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

CDW Corporation

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This whitepaper shares five important practices to follow in order to make sure data is properly secured and monitored in a PCI-DSS compliant fashion.
Posted: 10 Oct 2014 | Published: 10 Oct 2014


Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

High Alert on Cyber-Risk and Cyber-Security Preparedness
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

SurfWatch Labs

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA, The Security Division of EMC
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA, The Security Division of EMC

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data
sponsored by BitGlass
WHITE PAPER: This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box with the security and compliance of a private cloud.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


How to Eliminate Known Vulnerabilities with Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This exclusive IT download will let you try out a patch management solution that adds non-Microsoft third-party patch to Microsoft System Center Configuration Manager to maximize your investment in System Center and to reduce risks from unpatched third-party applications.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Market Surveillance and Monitoring
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper explores an out-of-the-box risk management solution that can help you deal with the demands of real-time financial markets.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Software AG

How to Define SIEM Strategy, Management and Success in the Enterprise
sponsored by TechTarget
RESOURCE: With the recent, highly-publicized data breaches, ensuring you can efficiently detect and respond to security issues should be a top-priority. This expert guide, available exclusively to members who have completed our SIEM survey, provides the insight you need to develop or revamp your SIEM strategy to set the stage for success.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement