IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web ThreatsReports
 
How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Strength Through Integration: Securing the Mobile Enterprise
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top security concerns for the growing mobile landscape and what you can do to best prevent cyber-attacks on your mobile devices.
Posted: 04 Apr 2014 | Premiered: 22 Jan 2014

Cisco Systems, Inc.

Data Security Through the Cloud
sponsored by Cisco Systems, Inc.
RESOURCE: The combination of cloud computing and mobility is often the perfect storm for security threats. Check out this blog post to learn about the threats that could be facing your data stored in the cloud, and how to overcome 2014's top cloud security challenges.
Posted: 03 Apr 2014 | Published: 06 Mar 2014

Cisco Systems, Inc.

How to Stop Online Payment Fraud Without Adding Friction
sponsored by ThreatMetrix
WEBCAST: This in-depth webcast explores many current methods used to detect online payment fraud in real-time and how you can be more transparent for your customers.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2014

ThreatMetrix

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Handling Security in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

How to be Ahead of Windows Security Threats
sponsored by Secunia
EGUIDE: In this e-guide, experts Paul Korzeniowski and Michael Cobb discuss how to position yourself ahead of the Windows security game. Read on to gain awareness of the risks that Web browser extensions can cause and what you can do to counter browser plug-in threats.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Secunia

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
sponsored by EMC Corporation
WHITE PAPER: To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Posted: 11 Apr 2014 | Published: 30 Sep 2012

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement