IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
Boost Protection Against Targeted Attacks with Sandboxing
sponsored by Trend Micro
WHITE PAPER: In this white paper, examine how sandboxing uncovers these hidden malware attacks by executing them in a secure and isolated environment.
Posted: 29 Sep 2015 | Published: 26 Aug 2015

Trend Micro

Uncover advanced attacks and detect breaches
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Hewlett-Packard Company

Shadow Data Exposed: 7 High Profile Risks
sponsored by Elastica
WEBCAST: In this webcast, you'll uncover the 7 high level risks of Shadow Data exisiting in your enterprise and how to gain control over Shadow IT. View now to learn how to gain more visibility into SaaS applications to prevent data loss or breaches.
Posted: 10 Sep 2015 | Premiered: Sep 2, 2015


The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Softchoice Corporation

Keep Security Up-to-Date with Cloud-Based Threat Intelligence
sponsored by IBM
TRIAL SOFTWARE: Try out this free software demo to discover how a cloud-based threat intelligence platform can enhance your security.
Posted: 16 Sep 2015 | Premiered: 16 Sep 2015


Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 02 Oct 2015 | Published: 15 Jan 2015


Threat Intelligence Tools and Services
sponsored by Webroot
EGUIDE: In this expert guide, learn how new threat intelligence products are attempting to make it easier to both use and provide threat intelligence services.
Posted: 11 Sep 2015 | Published: 11 Sep 2015


Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015


Security Certificates and Cryptographic Keys in Peril
sponsored by Venafi
EGUIDE: This expert guide discusses why security certificates and cryptographic keys can no longer be trusted and how you can stay safe from hacks that exploit them.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement