IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Vulnerabilities Reports
 
Data Protection for Higher Education
sponsored by Acronis
WHITE PAPER: Access this white paper to discover why it's important to protect institution data and the challenges that higher education institutions face with data protection.
Posted: 07 Jul 2015 | Published: 31 Mar 2015

Acronis

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

A Regional Hospital Stays HIPAA Compliant through On-Demand Vulnerability Assessments
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
CASE STUDY: This white paper details how one hospital was able to easily comply with HIPAA regulations and keep its data safe with continuous vulnerability assessments. Read on to find out how you can effectively protect your data while simplifying management so you can focus on other critical business.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

A Buyer’s Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

Enhancing Microsoft BitLocker for Your Enterprise
sponsored by WinMagic
WEBCAST: While BitLocker is a popular data encryption option, there are some gaps in the technology that need filling. This webcast explores how to enhance BitLocker to protect data at rest on any endpoint.
Posted: 30 Jun 2015 | Premiered: Dec 17, 2014

WinMagic

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement