IT Management  >   Systems Operations  >   Security  >   Security Management  >  


RSS Feed    Add to Google    Add to My Yahoo!
Vulnerabilities Reports
Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: In this white paper, you will learn about the prevalence of jailbroken iOS devices , how to protect against jailbroken device risks, and the limitations of existing jailbreak detection solutions.
Posted: 25 Aug 2015 | Published: 24 Jun 2015


2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


Top 5 Critical Capabilities for Your Malware Sandboxing Strategy
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes the top five traits that make malware sandboxing effective. Access now to discover how sandboxing can add an extra layer of strength to your security and keep you safe from advanced threats.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

Cloud Computing Without Security Compromises
sponsored by Intel and IBM
WHITE PAPER: In this resource, you'll discover how to guarantee data security in the cloud, from your servers to your applications without ad-hoc, cumbersome fortification. Read on to learn what bare-metal security measures your list of potential cloud providers should be offering to secure your sensitive data.
Posted: 12 Oct 2015 | Published: 23 Sep 2015

Intel and IBM

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015


Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015


Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014


Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation

Automating App Blacklisting
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.
Posted: 01 Apr 2015 | Published: 04 Feb 2015

Veracode, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement