IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

5 Security Controls for an Effective Security Operations Center (SOC)
sponsored by AlienVault
WHITE PAPER: Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

AlienVault

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement