IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed   
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 

Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Security Threats White Papers (View All Report Types)
1 - 25 of 855 Matches Previous Page  |  Next Page
Open and Dark Web Research: Tips and Techniques
sponsored by Authentic8, Inc.
WHITE PAPER: In this white paper, get an insider look into the Silo Researcher Toolbox, which provides investigators with the necessary capabilities to conduct secure research on the open and dark web without risking the exposure of your resources or your identity. Read on to learn more.
Posted: 18 Feb 2020 | Published: 29 Oct 2019

Authentic8, Inc.

How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Using Third-Party Marketing Tools on your Website Without Compromising Security
sponsored by Tala Security
WHITE PAPER: Learn how you can protect your website from vulnerabilities caused by marketing tools and other integrations by leveraging technology native to most browsers.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Tala Security

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

Prevent Browser-Injected Ads from Hijacking Your Customers
sponsored by Tala Security
WHITE PAPER: By eliminating browser-injected ads, you can enhance customer experience on your website, which can lead to increased conversions, reduced shopping cart abandonment, and more. But what is the best way to go about blocking unwanted ads? Download this white paper to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Tala Security

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

Business Email Compromise
sponsored by PhishLabs
WHITE PAPER: Traditional phishing certainly can (and does) cause a lot of damage to organizations, but on a per-attack basis, Business Email Compromise (BEC) is undoubtedly the most expensive. Why? View this guide to uncover everything you need to know about BEC attacks today.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

PhishLabs

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Ransomware - NEW for 2020: Ransomware Defense for Dummies - 2nd Edition
sponsored by Cisco Umbrella
WHITE PAPER: Many organizations that are targeted by ransomware attacks assume that paying the ransom is the fastest and most cost-effective way to get their data back, but this isn’t always the case. Download your copy of ‘Ransomware Defense for Dummies’ to learn how ransomware attacks work and how to defend against them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

The Impact of Unsecured Digital Identities
sponsored by Keyfactor
WHITE PAPER: In this report, uncover key research findings from a recent study conducted by the Ponemon Institute into the impact of unsecured digital identities. Download the full study to unlock the key insights from the research.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Keyfactor

Who is GOSSIPGIRL?
sponsored by Chronicle
WHITE PAPER: Flame (aka Flamer or sKyWIper) was the object of extensive research and fascination by the security community circa 2011. Flame proved to be one of the most daring threat actors ever discovered. This whitepaper investigates the connection between Flame and the O.G. threat actor super group, GOSSIPGIRL. Read on to learn more.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Chronicle

How to Create a Successful Cybersecurity Plan
sponsored by Malwarebytes
WHITE PAPER: According to a Ponemon Institute study, the average cost of a breach is $3.86 million. Aside from monetary costs, organizations also face potential legal and reputational ramifications. Download this paper to better understand the key areas for consideration to help get you started building a cybersecurity plan.
Posted: 12 Feb 2020 | Published: 31 Jul 2019

Malwarebytes

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Data Breach Response Revisited
sponsored by Absolute Software Corporation
WHITE PAPER: Learn how your organization can revisit your incident response plans and be prepared to detect, respond, and recover as quickly as possible.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Absolute Software Corporation

Abusing Code Signing for Profit
sponsored by Chronicle
WHITE PAPER: Code signing was originally developed as way of guaranteeing the authenticity of a published file. However, given that this process is based on trust, it can be easily manipulated by skilled hackers. Download this white paper to unlock the results of a recent study into this issue and discover where the key concerns lie.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Redefining security analytics with Chronicle Backstory
sponsored by Chronicle
WHITE PAPER: Today’s security teams face several challenges: from escalating threats and expanding networks and devices to the increased pressure of meeting security requirements. In this white paper, take a closer look at the 5 security requirements to include in your strategy and learn more about Chronicle’s Backstory data platform.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Chronicle

Chronicle Cybersecurity Predictions Crimeware, Cloud and Beyond
sponsored by Chronicle
WHITE PAPER: Cyberattacks are inevitable, affecting business of any size across all industries. While tactics used by cybercriminals always changes, it remains certain that security teams will always be on the lookout for threats to their networks. In this white paper, explore cybersecurity predictions for 2020 to ensure your organization is prepared.
Posted: 10 Feb 2020 | Published: 31 Dec 2019

Chronicle

Core - DNS - The fastest, easiest way to secure your network
sponsored by Cisco Umbrella
WHITE PAPER: IT leaders are under constant pressure to provide adequate security in an increasingly dangerous world. It can be difficult to sift through the countless security options to find a good fit for your strategy. In this white paper, take a closer look at Cisco Umbrella to determine if it would be a good fit for your team.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

The Cost of a Data Breach in Healthcare
sponsored by Absolute Software Corporation
WHITE PAPER: Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.
Posted: 10 Feb 2020 | Published: 08 Jan 2019

Absolute Software Corporation

Creating Secure IoT Device Identities
sponsored by Intertrust
WHITE PAPER: The Internet of Things (IoT) is redefining the way business operations are conducted. However, IoT applications are vulnerable to security risks, exposing an organization to threats. The following report highlights the underlying security issues with IoT and outlines ways to potentially mitigate today’s risks. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust

The state of mobile app security 2020
sponsored by Intertrust
WHITE PAPER: Employees today use 3 different devices in their daily routine – that number is expected to increase as organizations continue to adopt IoT. With the amount of sensitive data within mobile apps, ensuring their protection is paramount. In this report, explore key statistics and strategic insights for mobile app security in 2020.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust
1 - 25 of 855 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info