IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Internet Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security Vulnerabilities White Papers (View All Report Types)
The Cost of a Data Breach in 2015
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 cost of a data breach study and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can avoid these costs.
Posted: 10 Jul 2015 | Published: 31 May 2015


Stepping Up the Battle Against Advanced Threats
sponsored by IBM
WHITE PAPER: This white paper discusses how application control can keep your endpoints secure in today's challenging threat landscape. View now to learn how to stop the most common attack techniques; protect your enterprise credentials; and more.
Posted: 17 Sep 2013 | Published: 30 Aug 2013


Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Enterprise

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Automating IT Security Audits to Demonstrate Compliance and Protect Data
sponsored by NetIQ Europe
WHITE PAPER: This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

10 Best Practices for Microsoft SharePoint Security
sponsored by Thawte Inc.
WHITE PAPER: In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

Thawte Inc.

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement