IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Unstructured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Unstructured Threats Reports
 
Government Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report discusses the risks government agencies face when sensitive information is clearly displayed on a computer screen and gives suggestions for mitigating those risks.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

OptioLabs

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Protecting Against Wikileak Type Events and the Insider Threat
sponsored by Verdasys
WHITE PAPER: Insider theft of sensitive data is not new. WikiLeaks is just the latest outlet for the disaffected individual to be amplified in our interconnected world. Everyone must face the reality that the insider threat is a growing danger that can't be overlooked. View this paper to explore the challenges of insider theft and how to prevent it.
Posted: 24 Oct 2011 | Published: 03 Jan 2011

Verdasys

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA

Top Information Leakage Threats Facing Today's Financial Service Industry
sponsored by Vericept Corporation
WHITE PAPER: This white paper shows how content-aware risk management systems combat information leakage through a combination of detection methods including data-matching, database-matching and linguistic analysis.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Vericept Corporation

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement