IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed   
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Common Vulnerabilities and Exposures (CVE) is a dictionary of standard terms related to security threats. These threats fall into two categories, known as vulnerabilities and exposures. A vulnerability is a fact about a computer, server or network that presents a definite, identifiable security risk in a certain context. An exposure is a security-related situation, event or fact that may be considered  … 

Security Threats definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Security Threats Reports
51 - 75 of 2074 Matches Previous Page  |  Next Page
How Phishing Security Software is Different from Email Security Software
sponsored by Inky Technology
RESOURCE: All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Inky Technology

The state of mobile app security 2020
sponsored by Intertrust
WHITE PAPER: Employees today use 3 different devices in their daily routine – that number is expected to increase as organizations continue to adopt IoT. With the amount of sensitive data within mobile apps, ensuring their protection is paramount. In this report, explore key statistics and strategic insights for mobile app security in 2020.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust

What Do You Mean TLS 1.3 Might Degrade My Security?
sponsored by Gigamon
WHITE PAPER: Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Gigamon

Collective Offense Calls for Collective Defense
sponsored by IronNet
WHITE PAPER: Advanced cybersecurity systems, such as AI and ML, are not preventing cyber incidents. Disparate efforts to thwart attacks are unlikely to remain sustainable as threats increase. Download this white paper and discover the collective defense platform: where security teams aggregate their threat intelligence to increase awareness and response time.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Winnti: More than just Windows and Gates
sponsored by Chronicle
WHITE PAPER: Winnti malware has been around since 2013 and has been the source of several significant data breaches. Chronical researchers recently conduct a technical analysis to unravel several campaigns where Winnti malware was leveraged. Download this report to uncover the results of their study.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Chronicle

The Case for Collective Defense
sponsored by IronNet
WHITE PAPER: In this e-book, learn about the concept of collective defense and how the democratization of an advanced and powerful cyberdefense that applies behavioral detection at scale across entire industry sectors is revolutionizing how companies of all sizes are addressing cybersecurity.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments
sponsored by Cisco Umbrella
WHITE PAPER: Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.
Posted: 07 Feb 2020 | Published: 31 Jan 2020

Cisco Umbrella

Governance, Risk, and Compliance: Use Case Guide
sponsored by ServiceNow
WHITE PAPER: Tap into this guide to see how an integrated risk program on a common platform can help continuously monitor for risk and compliance across the extended enterprise, holistically prioritize risk based on business impact to improve decision making, and much more.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

ServiceNow

GRC Continuous Monitoring and Configuration for Compliance
sponsored by ServiceNow
DATA SHEET: Learn how you can quickly respond to configuration issues based on the risk they present to your business with Continuous Monitoring from ServiceNow.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

ServiceNow

Core - DNS - Threat Intelligence – the new driver for incident response
sponsored by Cisco Umbrella
WEBCAST: Malware attacks in the financial services industry have grown considerably over the past year. Organizations are finding that they require complete network visibility to consolidate disparate security efforts and establish a strong resiliency program. In this webinar, discover the foremost threats of 2019 and how integrated security can help.
Posted: 07 Feb 2020 | Premiered: Jan 15, 2020

Cisco Umbrella

Cybersecurity and Education: The State of the Digital District in 2020
sponsored by Absolute Software Corporation
WHITE PAPER: Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Absolute Software Corporation

How PCI-Compliant SD-WAN Helps Retailers Effectively Boost Security
sponsored by Comcast Business
RESOURCE: In this blog, ensure your retail business is doing everything it can to secure its networks by looking at the types of attacks leading to data breaches and learning how an SD-WAN solution not only addresses the business needs associated with application device and network proliferation, but also enables more efficient and effective PCI compliance.
Posted: 07 Feb 2020 | Published: 10 Jan 2020

Comcast Business

Iranian Threat Groups and Campaigns
sponsored by IronNet
WHITE PAPER: In a recent study, cybersecurity experts studied leading cyberthreat groups across Iran in order to provide a comprehensive report summarizing documented campaigns, common target & actor types, and geographic trends in attack patterns – all in order to help organizations be better prepared in the event of an attack.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

IronNet

Hunting Remote Access Trojans
sponsored by DomainTools
WHITE PAPER: While cybersecurity pros don’t have the legal rights to “hack back”, they can learn what new controls are required, even before a threat actor envisions their new tool, technique or procedure. In this hunting guide, discover ways you can seek out threats using threat investigation tools.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

DomainTools

Core - DNS - Network Security for SD-WAN
sponsored by Cisco Umbrella
WHITE PAPER: According to a 2019 study, 68% of security breaches involved branch offices and roaming users as the source of compromise. Download this white paper to find out how to deliver network security for today's evolving WAN networks and protect remote and roaming users.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Core - DNS - What attacks aren't you seeing?
sponsored by Cisco Umbrella
EBOOK: Networks are growing increasingly dispersed and hackers are adapting their attack methods to expose gaps amongst endpoints. In this e-book, discover how a complete network visibility strategy can help to identify risks and block potential threats before they have a chance to strike.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Data protection requires visibility of your network in order to understand where the likely risks lie and acting before they strike. As simple as it may sound, this can be a daunting task. These 9 steps will walk you through how to implement effective data protection controls. Read on to get started.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

SOAR Buyer’s Guide
sponsored by DomainTools
WHITE PAPER: Many security teams are using SOAR platforms to operationalize threat intelligence. But not all security solutions are created equal and it’s important that all internal factors are taken into consideration when opting for one security solution over another. Dive into the SOAR Buyer’s Guide for everything you should consider.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

DomainTools

All Clouds Are Not Equal
sponsored by Forcepoint
EBOOK: When it comes to cloud security, there are a good deal of misconceptions that persist.In fact, security concerns are usually the main reason why an organization stays away from cloud. In this e-book, debunk the 5 most common cloud security misconceptions and learn what to look for in a cloud-based security solution.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
EBOOK: It’s predicted that there will be 1.87 billion mobile workers worldwide by 2022, representing 42.5% of the global workforce. As mobile devices grow, the idea of a traditional perimeter begins to fade. Download this e-book and learn why organizations are adopting a user & data-centric approach to multi-cloud security.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

Core - DNS - The Role of Predictive Intelligence in the Fight against Cyberattacks
sponsored by Cisco Umbrella
WHITE PAPER: The reactive nature of threat intelligence makes it difficult for organizations to keep pace with the increasing frequency of modern attacks. In this white paper, take a closer look at predictive intelligence and how you can monitor live activity to better anticipate when and where and attack will strike.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

The Value of Threat Intelligence
sponsored by DomainTools
WHITE PAPER: With over 80% of organizations reporting 1 or more security incidents over the past year, it’s safe to say that security issues are common. This study shows that while most organizations can defend against malware attacks, they fail against most other threats. Read on to view the results of Osterman’s study into the value of threat intelligence.
Posted: 05 Feb 2020 | Published: 30 Nov 2019

DomainTools
51 - 75 of 2074 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info