IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats Reports
Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Stay Ahead of Attacks: Uncovering Malicious Infrastructure
sponsored by OpenDNS
WHITE PAPER: Find out how to gain a complete view of the relationships and evolution of Internet domain names, IP addresses, and autonomous systems. Continue reading to uncover the infrastructure being staged and how to identify threats before the kill chain begins.
Posted: 13 Oct 2015 | Published: 07 Oct 2015


Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 12 Nov 2015 | Published: 01 Jun 2015

Hewlett Packard Enterprise

Infographic: Is Your Data Classified?
sponsored by Identity Finder, LLC
WHITE PAPER: In a world where classifying your sensitive data prevents and reduces risk for 75% of breach events, it's in your best interest to be prepared. Access this infographic and learn methods for tackling classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Cloud-Based Network Security Test Results Revealed
sponsored by OpenDNS
CASE STUDY: In this brief white paper, examine the results of a third-party security test of one cloud-delivered network security service.
Posted: 13 Oct 2015 | Published: 07 Oct 2015


Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Five Reason to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This resource presents the top five benefits you can enjoy by adopting an MSSP. Find out what an MSSP can offer you and decide if an MSSP is the right solution to your cybersecurity dilemma.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement