IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day ThreatsReports
 
Security based on trust not fear
sponsored by Qualys
WHITE PAPER: This paper provides examples showing how cloud services can be used to ensure that web applications and websites can instill trust and confidence in the minds of customers.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Strength Through Integration: Securing the Mobile Enterprise
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top security concerns for the growing mobile landscape and what you can do to best prevent cyber-attacks on your mobile devices.
Posted: 04 Apr 2014 | Premiered: 22 Jan 2014

Cisco Systems, Inc.

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Mobile Application Security Chaos
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: 08 Apr 2014 | Premiered: Apr 8, 2014

Hewlett-Packard Company

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Signature-less Malware Detection: Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats.
Posted: 15 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement