IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Security VulnerabilitiesReports
 
How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra and Sandbox Security
sponsored by Vectra Networks
WHITE PAPER: This white paper introduces Vectra, a leading innovator in real-time detection of in-progress cyber attacks that complements sandbox security solutions to create an in-depth defense against advanced persistent threats.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Vectra Networks

Patch Management Best Practices for IT Professionals
sponsored by LabTech Software
EBOOK: Keeping systems up-to-date with patches is a full-time job, and the lag time between when vulnerability is discovered and when a virus or worm appears is now measured in days or weeks rather than months. This free eBook provides best practices you can follow to ensure your organizations' systems are always up-to-date.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

LabTech Software

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

High Alert on Cyber-Risk and Cyber-Security Preparedness
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

SurfWatch Labs

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Plan to Migrate before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, explore why it is crucial to begin your migration away from WS 2003 now and what your options are for an upgrade. View a pros and cons list of several server and OS avenues you can take. Read on to discover IT professional insights to assess which solution is right for your organization's workload and budget.
Posted: 05 Dec 2014 | Published: 05 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement