IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 
Definition continues below.
Vulnerability Assessments Reports
1 - 25 of 317 Matches Previous Page  |  Next Page
Ultimate Guide to Multi-Vector DDoS Protection
sponsored by A10 Networks
WHITE PAPER: This white paper shares with you everything you need to know about DDoS attacks on the rise. You'll discover how and where they attack, why most existing solutions fall short and 5 key components of an ultimate multi-vector DDoS attack protection solution.
Posted: 21 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Trustwave Managed Security Testing - DON’T GUESS. TEST.
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


Protecting the Enterprise from User Security Vulnerabilities
sponsored by RES Software
RESOURCE: Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

RES Software

The Total Economic Impact of Software Testing Tools
sponsored by Synopsys
RESOURCE: The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of security tools on their organizations. Discover how you can catch and fix quality defects and security vulnerabilities om source code earlier in the software development cycle when they are cheaper and easier to address.
Posted: 11 Oct 2016 | Published: 01 Sep 2016

The Truth After the Hype: Improve Mobile Data Security
sponsored by vmware airwatch
EGUIDE: In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

vmware airwatch

5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


Healthcare Security: The Simplest Way to Stay Ahead of Attacks
sponsored by OpenDNS
RESOURCE: In healthcare, a ransomware outbreak can lead to a true life or death situation – and cybercriminals know that you'll pay up to decrypt patient data. Access this brief to find out how you can simplify PHI protection and close security gaps to significantly reduce malware from getting in and data from being exfiltrated.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


Security Testing Practices and Priorities
sponsored by Trustwave
WHITE PAPER: This report shows the survey results from Osterman Research about security testing within various organizations. Discover which security issues organizations had experienced most frequently within the past year and how vulnerable many of these organizations were.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


The Security Survival Guide for Growing Businesses
sponsored by Trustwave
WHITE PAPER: This guide will walk you step by step through the reasons why your security may be suffering and offer practical tips for addressing your pain points so you can take your data protection to the next level.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


Assess Your Open File Shares to Combat Security, Compliance Risk
sponsored by STEALTHbits
SOFTWARE DEMO: Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.
Posted: 27 Sep 2016 | Premiered: 31 Aug 2016


Risk Assessment
sponsored by STEALTHbits
TRIAL SOFTWARE: In as little as 5 hours, you'll learn your top 5 data security vulnerabilities and get insight on how to patch them up.
Posted: 27 Sep 2016 | Premiered: 31 Aug 2016


The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016


Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016


The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016


Addressing the Full Attack Continuum (BDA WP)
sponsored by Cisco Systems, Inc.
WHITE PAPER: It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.
Posted: 13 Sep 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Open Access : Restrict access where it need be restricted
sponsored by STEALTHbits
WHITE PAPER: Discover how to discern who has access to your unstructured data and see all open shares on your network. Protect against malicious access, reduce security risk, fulfill compliance requirements and decrease operations expense by first accessing this valuable resource.
Posted: 13 Sep 2016 | Published: 31 Dec 2015


Securing Connected Cars Through Comprehensive Software Testing
sponsored by Synopsys
WHITE PAPER: There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle rolls into the dealership.
Posted: 13 Sep 2016 | Published: 01 Aug 2016

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us
sponsored by Neustar
WHITE PAPER: Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


How are Banks Fighting the War on Fraud
sponsored by Neustar
WHITE PAPER: Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.
Posted: 03 Oct 2016 | Published: 31 Dec 2014


Cyber Threats to Online Shopping Cheer
sponsored by Neustar
WHITE PAPER: Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.
Posted: 03 Oct 2016 | Published: 31 Dec 2016


Case Study: Reclaiming Website Security and Control
sponsored by Neustar
WHITE PAPER: Cochrane needed faster, more secure service from their DNS to ensure domain queries are routed correctly and to keep their audience happy. Discover how Cochrane was able to slash response times and ensure maximum server uptime, all while bolstering security.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016


Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

1 - 25 of 317 Matches Previous Page    1 2 3 4    Next Page
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common … 
Vulnerability Assessments definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement