IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed   
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 

Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Security Threats Reports
26 - 50 of 2181 Matches Previous Page  |  Next Page
Is My Smart Home Telling People What I Do Every Day?
sponsored by Radware
RESOURCE: Click inside to learn about the current state of smart home security, as well as some steps providers should take in the near future to protect their customers.
Posted: 07 Mar 2018 | Published: 13 Feb 2018

Radware

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for compliance regulations.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

Are You Protected Against Burst Attacks?
sponsored by Radware
RESOURCE: In this resource, get a step-by-step breakdown of burst attack detection and prevention, then learn why a system that combines on-premise and in-the-cloud protection is the best way to defend against burst attacks.
Posted: 06 Mar 2018 | Published: 15 Feb 2018

Radware

Security Trends: Data Theft and Ransomware Plague Healthcare Organizations
sponsored by IBM
WHITE PAPER: According the Cost of a Data Breach Study, the healthcare industry's data breach cost, $355 per record, is more than twice the mean across all industries of $158 per record. Inside this resource uncover how to protect your healthcare organization while reducing cost and complexity and proactively hunt and respond to threats.
Posted: 02 Mar 2018 | Published: 31 Dec 2016

IBM

The Five Essential Capabilities Of An Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: This white paper outlines how you can gain visibility into potential vulnerabilities by adopting an analytics-driven SOC. Read on to find 5 capabilities that are "must-haves" in this type of system.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

Splunk

Global Application and Network Security Report
sponsored by Radware
RESEARCH CONTENT: Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

Radware

Zero-Day Malware Protection for the Enterprise Network
sponsored by Radware
RESOURCE: Nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses. Tap this resource to learn how to defend against zero-day malware by integrating machine learning algorithms into existing protection mechanisms and defense layers.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Radware

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

Identifying and Protecting Critical Value Data
sponsored by Nuix
WHITE PAPER: Find out how you can improve your protection of sensitive data and prevent data losses by learning how to identify what your critical value data is, where it exists, and who can access it.
Posted: 27 Feb 2018 | Published: 31 Dec 2015

Nuix

Phoenix Contact's mGuard Integration with SilentDefense
sponsored by SecurityMatters
RESOURCE: This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

Industrial Networks Visibility & Control
sponsored by SecurityMatters
RESOURCE: To defend control networks, it is imperative to monitor network and process operations to detect dangerous messages. Leverage this resource to gain full visibility and control over industrial networks, while protecting from unauthorized access.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

SecurityMatters

Telecom Providers: Improve your Subscribers' Experience
sponsored by Vitria Technology, Inc.
WHITE PAPER: To help improve customer experience, learn how telecom providers can reduce the time from the start of service incidents to issue resolution by accelerating each phase of the incident lifecycle using an effective analytics strategy.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Vitria Technology, Inc.

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
sponsored by Radware
RESOURCE: Learn the 5 most dangerous attacks in 2017 and the steps to protect your organization's network.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Radware

WAF and DDoS: Perfect Bedfellows
sponsored by Radware
RESOURCE: This resource explains how DDoS and WAF strategies should be integrated together to improve attack mitigation capabilities while maintaining customer expectation.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

Radware

3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER: In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018

Illusive Networks

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
RESOURCE: This infographic summarizes key findings of the 2017 Ponemon Juniper Report detailing why automation technologies are joining forces with current security strategies.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Juniper Networks

Security and the de-Commoditization of Data
sponsored by Juniper Networks
WEBCAST: According to recent reports, 81% of breaches involve stolen or weak passwords. In this webcast, learn how to prevent a security attack and protect your organization from a data breach.
Posted: 20 Feb 2018 | Premiered: Sep 30, 2017

Juniper Networks

Externalized Dynamic Authorization in a MicroServices World
sponsored by Axiomatics
RESOURCE: This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Axiomatics

Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Vulnerability and Threat Trends Report 2018
sponsored by Skybox Security
RESEARCH CONTENT: This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Skybox Security

Ransomware Response Guide: IBM Incident Response Services
sponsored by IBM
RESOURCE: Learn more about how your organization can maintain the current antivirus or endpoint protection, and the steps you can take if you are experiencing a ransomware incident.
Posted: 28 Feb 2018 | Published: 31 Dec 2017

IBM
26 - 50 of 2181 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement