IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Vulnerabilities Reports
 
Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM

An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.
Posted: 06 May 2015 | Published: 06 May 2015


The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Best Practices for Web Application Security
sponsored by White Hat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 06 May 2015 | Published: 06 May 2015

White Hat Security

Enterprise Security Must Move Beyond Building Protective Walls
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper outlines and explores the six steps of the Attack Life Cycle and takes you into the minds of hackers and cybercriminal teams to help you better craft your security strategy. Read on now to learn how to allocate resources so defenses are most appropriate to the risks.
Posted: 13 Apr 2015 | Published: 08 Apr 2015

Hewlett-Packard Company

Security Reimagined
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 06 May 2015 | Published: 31 Dec 2014

FireEye

dapt Your Endpoint Security to Mobility and Advanced Threats
sponsored by AVG Technologies
EGUIDE: Read this expert guide to learn about the different kinds of endpoint security options available, and to begin creating strong, multi-layered defense for all your endpoints.
Posted: 21 May 2015 | Published: 21 May 2015

AVG Technologies

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement