IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed   
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 

Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Security Threats Reports
1 - 25 of 2639 Matches Previous Page  |  Next Page
The DevOps Roadmap for Security
sponsored by Signal Sciences
WHITE PAPER: Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Signal Sciences

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security orchestration and automation can make teams faster and more efficient. But, how do you measure that? Download this white paper to evaluate the return on your investments in security orchestration and automation.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Rapid7

Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ThreatX

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores what credential stuffing is and how it works, helping you to understand the potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on the research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application attacks and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

The Need for an Integrated Security Strategy
sponsored by Fortinet, Inc.
ANALYST REPORT: CISOs are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. An integrated security strategy can help. Download this report for some Q&A on the advantages of implementing an integrated security strategy in your organization.
Posted: 11 Oct 2018 | Published: 30 Jun 2018

Fortinet, Inc.

Automating Incident Response
sponsored by Swimlane
WHITE PAPER: Staying on top of thousands of security alerts every day is exhausting for a cybersecurity team and missing even one incident can contribute to risk exposure. Learn how automated incident response and security orchestration can help alleviate these issues for your security team, today.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Swimlane

8 Real World Use Cases for Security Automation and Orchestration
sponsored by Swimlane
RESOURCE: Discover the 8 real world use cases for security automation and orchestration (SAO) and they can help your organization stay ahead of threats.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Swimlane

Machine Learning Pushes Fortiweb to the Head of the WAF Class
sponsored by Fortinet, Inc.
WHITE PAPER: Web application firewalls (WAFs) have taken center stage in enterprise security architectures due to the complexity of the threat landscape. In this white paper, discover the key features of a WAF that meets the security and operational requirements that security organizations need.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Introducing ThreatConnect's Intel Report Cards
sponsored by ThreatConnect
PRODUCT OVERVIEW: Learn about the report card feature and metrics, and how you can use insights into how certain feeds are performing within your threat intelligence platform to make better decisions throughout your security lifecycle.
Posted: 11 Oct 2018 | Published: 03 May 2018

ThreatConnect

The Power and Responsibility of Customer Data and Analytics
sponsored by ThreatConnect
RESOURCE: Learn how ThreatConnect uses customer data and analytics can help your organization avoid future compromises in trust and enhance data security.
Posted: 11 Oct 2018 | Published: 12 Apr 2018

ThreatConnect

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Just the TIP of the Iceberg: Categorizing the Evolving Threat Intelligence Platform
sponsored by ThreatConnect
RESOURCE: Discover why ThreatConnect was determined to create a platform that had flexibility, extensibility, utility and process automation to help security teams effectively detect threats.
Posted: 11 Oct 2018 | Published: 27 Apr 2018

ThreatConnect

Mapping the Requirements of Next-Generation Sandboxing
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 7 key capabilities to look for in a next-gen sandboxing platform so that you can build a security architecture that's designed to detect and prevent threats before they can impact your network or your business as a whole.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

The State of Vulnerability Response in Financial Services: Patch Work Demands Attention
sponsored by ServiceNow
WHITE PAPER: Download this report for a look at what 467 cybersecurity professionals in the financial services industry have to say about data breaches and how your organization could benefit from end-to-end vulnerability patching.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ServiceNow

A CISO Guide to Modern Security Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, learn how implementing a modern security architecture can secure your entire organization, meet the demands of compliance, and proactively manage risk.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Fortinet, Inc.

Navigating a Security Wasteland
sponsored by ThreatConnect
RESOURCE: Inside, Adam Vincent – CEO and co-founder of ThreatConnect, takes a deep dive with Kathie Miley –COO of Cybrary, to discuss how managing your enterprise security organization like a small business is pivotal when it comes to application and cloud security.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

ThreatConnect

Just the TIP of the Iceberg: Categorizing the Evolving Threat Intelligence Platform
sponsored by ThreatConnect
WHITE PAPER: Discover why ThreatConnect was determined to create a platform that had flexibility, extensibility, utility and process automation to help security teams effectively detect threats.
Posted: 09 Oct 2018 | Published: 27 Apr 2018

ThreatConnect

Fileless Attacks
sponsored by Bitdefender
RESOURCE: Cybercriminals don't have to use malware files anymore to achieve a successful data breach or attack. Fileless or zero-footprint attacks are growing in popularity, today. Why? Read on to find out.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Bitdefender

Pre and Post-GDPR Era
sponsored by Fortinet, Inc.
RESOURCE: What does your organization still need to be aware of in a GDPR governed digital world? Download this resource for more information.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Fortinet, Inc.

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

AlienVault

Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017

Bitdefender

Building a Threat Intelligence Program
sponsored by ThreatConnect
RESEARCH CONTENT: Cybersecurity decision makers overwhelmingly agree that their organizations should be investing more in their threat intelligence programs. In this report, uncover research findings from 351 cybersecurity decision makers in the U.S. on best practices and impact of building a threat intelligence program.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

ThreatConnect

More is Not More: Busting the Myth that More Threat Intel Feeds Lead to Better Security
sponsored by ThreatConnect
WHITE PAPER: In this white paper, find out how to effectively evaluate a threat intel feed and how to use the DIKI pyramid to help decide which threat intel feeds are relevant to your organization.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

ThreatConnect
1 - 25 of 2639 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement