IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed   
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 

Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Security Threats Reports
1 - 25 of 2116 Matches Previous Page  |  Next Page
How to seamlessly and securely transition to hybrid cloud
sponsored by Kaspersky Lab
WHITE PAPER: As organizations begin rapidly embracing hybrid cloud for its various benefits, it’s critical that ensuring security is at the foundation of the transition. Read this white paper to learn more about the importance of hybrid cloud security, common challenges and how to overcome them.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Kaspersky Lab

Defend Against Cyber Threats
sponsored by TechData - Microsoft
VIDEO: Today’s cyberattacks are growing in both volume and complexity, and existing defense methods are only able to detect known threat vectors. To keep pace with modern threats, organizations need a proactive approach to cybersecurity. Watch this video to learn more about Microsoft’s approach to detecting and mitigating threats.
Posted: 06 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

What Is Microsoft 365 Business Premium?
sponsored by TechData - Microsoft
VIDEO: Small and medium-sized businesses account for 95% of global organizations and are the target of 43% of cyberattacks. So, how can small and medium-sized organizations ensure they’re as protected as the large companies? Watch this video to find out.
Posted: 06 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW: The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Barracuda

GDPR Compliance support that works for your business
sponsored by TITUS
PRODUCT OVERVIEW: GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

Creating a Culture of Security
sponsored by TITUS
PRODUCT OVERVIEW: Effective security cultures are essential to an organization’s success. In order to compliment the investments made into security tools, executives need to encourage communication, feedback, and establish tactics for mitigating threats. This solution brief discusses how Titus may be able to help you get started.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

Secure Mobility for Remote Workers
sponsored by Lookout Inc.
CASE STUDY: Organizational culture is shifting to enable distributed workforces. However, there are significant challenges to consider when it comes to securing remote users and devices. In this case study, explore the key features of Lookout various services and discover if the capabilities are a good fit for your remote worker security needs.
Posted: 06 Apr 2020 | Published: 20 Mar 2020

Lookout Inc.

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by Cyber-Ark Software
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cyber-Ark Software

Microsoft 365 Business Premium Secures Your Devices
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn how Microsoft Office 365 can help secure all your devices.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft

The Comprehensive 1-minute IT Audit
sponsored by TechData - Microsoft
VIDEO: In this short and comical video, learn about Microsoft 365 Business Premium and how it can help SMB security needs.
Posted: 03 Apr 2020 | Premiered: 03 Apr 2020

TechData - Microsoft

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Guide to Remote Workforce Management: Trends, Tips and Tactics
sponsored by ActivTrak
WHITE PAPER: Inside this guide, find trends, tips, and tactics on how to keep pace with the shift towards remote working.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

ActivTrak

Gaining a Hacker's Perspective of API Vulnerabilities
sponsored by Ping Identity Corporation
WEBCAST: While APIs have enabled organizations to modernize their business operations, most organizations feel that they are also an area of potential weakness. This webinar aims to better understand today’s challenges and how to mitigate them by examining key API threats through the perspective of a hacker.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Ping Identity Corporation

Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER: For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Ping Identity Corporation

Trends in Email Security
sponsored by Armorblox
RESEARCH CONTENT: In order to gain insight into email security trends, ESG surveyed 403 IT and cybersecurity professionals responsible for evaluating, purchasing, and managing email security products, processes, and services. Download this survey report to uncover the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.

Data security success at financial institutions around the world
sponsored by TITUS
CASE STUDY: In order to protect their sensitive data and critical applications, security leaders at financial institutions have worked to integrate adequate cybersecurity methods. This white paper highlights a few key examples of global financial institutions who saw success from their partnerships with Titus. Read on to learn more.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

TITUS

Augmenting Security with Always-On
sponsored by Radware
ANALYST REPORT: The impact of a DDoS attack is massive. Web Services remain unavailable due to volumetric attacks and enterprises incur hefty losses that run into millions. In this Frost & Sullivan report, learn why a hybrid always-on deployment model is the ideal solution to combat sophisticated DDoS attacks.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Cyber Resilience for Dummies
sponsored by Mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Mimecast

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365 Business Premium, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software
1 - 25 of 2116 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info