IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Vulnerabilities Reports
 
Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

Appthority

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Case Study: Reclaiming Website Security and Control
sponsored by Neustar
WHITE PAPER: Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement