IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
Windows XP Now Draws Hackers to it like Bees to Honey
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to find out how you can easily upgrade your software and protect yourself from the inevitable attacks.
Posted: 30 Jan 2015 | Published: 22 May 2014

IBM

Protecting your Data Strategy in the Cloud
sponsored by BitGlass
EGUIDE: In this expert e-guide, you will uncover how to adjust your cloud security strategy based on use and the vendor. Read on now to learn about new attack vectors and security complications.
Posted: 20 Feb 2015 | Published: 07 Jan 2015

BitGlass

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 01 Feb 2015 | Published: 30 Dec 2013

Hewlett-Packard Company

SANS - Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 01 Feb 2015 | Published: 28 Feb 2014

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.

Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement