IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Security VulnerabilitiesWhite Papers (View All Report Types)
 
The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012


Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

2010: Cybercrime Coming of Age
sponsored by ESET
WHITE PAPER: In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.
Posted: 02 Feb 2010 | Published: 01 Jan 2010

ESET

HP Fortify Software Security Center- Proactively Eliminate Risk in Software
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Knowledge is Power: The Symantec Guide to Protecting your Website
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement