Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 151 - 175 of 4740Sort Results By: Published Date | Title | Company Name
White Paper Published By: Qualys     Published Date: Sep 29, 2016
With ThreatPROTECT, you get a holistic, contextual and continually updated at a glance view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now
Tags : 
protection, threats, data, vulnerabilities, data protection
    
Qualys
White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamais Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scaleyou need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarters hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity
    
Akamai Technologies
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security
    
IBM MaaS360
White Paper Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security
    
BitSight Technologies
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss todays rapidly evolving cyber threat landscape and LogRhythms new Security Intelligence Maturity Model (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security
    
LogRhythm
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employees USB stick, one hacker, one virus, or one careless error to compromise your companys reputation and revenue. The threat of data breach is real and its critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock
White Paper Published By: LifeLock     Published Date: Sep 12, 2016
How you handle a data breach says a great deal about your companys integrity. LifeLock Breach Response Services works with corporations to develop proactive, pre-negotiated strategies and breach response plans to stay ahead of a crisis.
Tags : 
authentication
    
LifeLock
White Paper Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. Its a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
security management, web service security
    
Webroot Inc
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.