IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats Reports
 
Hackers Open Malware Backdoor in Apache Webservers
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide examines Linux/Cdorked.A and the damage it deals. View now to learn how to fight back against hackers who are using it and how to secure your webserver.
Posted: 15 Apr 2015 | Published: 04 Mar 2015

GeoTrust, Inc.

Data Security Strategies for Next Gen Data Warehouses
sponsored by IBM
WHITE PAPER: In this white paper, you will learn why you need an end-to-end security strategy for data warehouse environments and why perimeter defenses such as firewalls and user access management fail to detect threats.
Posted: 22 Apr 2015 | Published: 17 Jul 2013

IBM

Fending Off the Known and Unknown - Runtime Application Security
sponsored by Prevoty
WHITE PAPER: In this white paper, explore how to monitor and protect applications at runtime and neutralize known vulnerabilities as well as zero day attacks through app self-defense.
Posted: 14 Apr 2015 | Published: 01 Apr 2015

Prevoty

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Application Self Defense: Reducing the Impact of High Attack Volume
sponsored by Prevoty
CASE STUDY: This case study outlines how one sports media organization moved beyond threat detection and into real-time prevention against cross-site scripting (XSS), SQLi, and malware attacks. Read on to examine the solution that they chose and if it's right for your organization.
Posted: 09 Apr 2015 | Published: 01 Apr 2015

Prevoty

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement