IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
 
10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance and data loss prevention (DLP) solutions, and it gives advice for being smart when implementing these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

8 Elements Of Complete Vulnerability Management
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: Read this white paper to discover the eight elements of comprehensive vulnerability management, and to learn how you can make sure your vulnerabilities stay sealed against even the most sophisticated attacks.
Posted: 28 May 2015 | Published: 28 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

2015 Cost of Data Breach Study: United Kingdom
sponsored by IBM
WHITE PAPER: This report analyzes the financial cost of cybercrime in the UK, discussing how much harm a hack can cause and what the implications are for your business.
Posted: 13 Jul 2015 | Published: 31 May 2015

IBM

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

Protect Information Like a Pro: A Guide for Enterprise CIOs
sponsored by Clearswift
EGUIDE: This CIO essential guide teaches you how to protect information and is designed to give IT leaders strategic management and decision-making advice.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Clearswift

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement