IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability

RSS Feed    Add to Google    Add to My Yahoo!
Network VulnerabilityWhite Papers (View All Report Types)
 
Quantifying the Impact of Network-Based Attacks
sponsored by Dell Software
WHITE PAPER: This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Dell Software

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012


Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Lumension

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

The Hidden Security Threat -- When Ex-Employees Represent a Security Risk
sponsored by Kaspersky Lab
WHITE PAPER: From the laid-off to the disgruntled, ex-employees with an axe to grind can make companies vulnerable to data theft. Kaspersky Lab security evangelist Ryan Naraine discusses the threat and offers practical advice to prevent data loss.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Next-Generation Vulnerability Management
sponsored by SAINT Corporation
WHITE PAPER: This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SAINT Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

10 Best Practices for Microsoft SharePoint Security
sponsored by Thawte Inc.
WHITE PAPER: In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

Thawte Inc.

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

Improving Tools and Techniques to Combat Malware Evolution
sponsored by Webroot
WHITE PAPER: Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement