IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
The Importance of Multi-Layered Web Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines the importance of having a multi-layered Web security approach in today's quickly evolving online market. Access now and uncover what you can do to ensure your Web security strategy is as effective and adaptive as it should be.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Use Cases for Big Data Security Analytics and Threat Intelligence Services
sponsored by Threat Track Security
EGUIDE: This expert guide discusses how big data analytics and threat intelligence can aid in developing better incident detection and response.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Threat Track Security

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Critical Role of DNS Calls for Vulnerability Mitigation
sponsored by Neustar®
WHITE PAPER: This white paper explores the current state of DNS threats, vulnerabilities, and 3 most common attacks.
Posted: 29 May 2015 | Published: 13 May 2015

Neustar®

Value of Security Analytics & Anomaly Detection
sponsored by Prelert
RESEARCH CONTENT: In this infographic you will find the results of an EMA research report, digested for easy consumption and action.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Prelert

The Quick Guide to Data Protection Managed Security Services
sponsored by NexGen Storage
WHITE PAPER: This white paper explores the 3 reasons cybercriminals target organizations with limited IT staffs and why data protection needs to be the number one priority.
Posted: 27 May 2015 | Published: 29 Apr 2015

NexGen Storage

Re-Assessing APT and Network Security
sponsored by Threat Track Security
WHITE PAPER: In this white paper, take an in-depth look at how advanced attack campaigns are constructed and why traditional security approaches are failing to detect and mitigate them. View now to learn how to re-assess your security strategy.
Posted: 26 May 2015 | Published: 13 May 2015

Threat Track Security

5 ½ Things That Make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines the 5 (and a half) components that make a firewall next-gen. Continue reading to learn 4 practical considerations when migrating from legacy to a next-gen firewall.
Posted: 05 Jun 2015 | Published: 08 Dec 2014

Fortinet, Inc.

The Current State of Server Security Affairs
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth examination of the current state of server security.
Posted: 27 May 2015 | Published: 26 Dec 2014

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement