IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 
Definition continues below.
Vulnerability Assessments White Papers (View All Report Types)
1 - 25 of 171 Matches Previous Page  |  Next Page
A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Best Practices for Threat & Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Core Security Technologies

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

2015 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper provides the full details on the 2015 global data breach study, and shows you how to adequately protect your data. Read on to learn more about why the costs of data breaches have increased, and how you can respond immediately in the event of a breach.
Posted: 10 Jul 2015 | Published: 31 May 2015

IBM

The Top 10 TLS/SSL Client, Server, and Application Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

WhiteHat Security

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Achieving Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: This white paper discusses the kind of multi-tiered security strategy that will most effectively keep your enterprise safe.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

IBM

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This white paper describes how you can implement an endpoint management program that ensures optimal security through complete control and network-wide visibility.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Networks That Know Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains how virtualization can work in your favor, offering benefits such as scalability, agility, and efficiency. Read on to discover a checklist that contains the key attributes of a virtualized network architecture.
Posted: 27 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Networks That Know Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why you must implement a multi-dimensional security approach to minimize any potential risks associated with the cloud.
Posted: 24 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: In this paper, SANS discusses how the layered model is more relevant than ever and how a layered approach to security provides better protection of your organization's IT assets.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Study on Cybercrime's Cost to Business
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common … 
Vulnerability Assessments definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement