IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 
Definition continues below.
Vulnerability Assessments Reports
1 - 25 of 298 Matches Previous Page  |  Next Page
Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Ponemon Institute Application Security Risk Management Study
sponsored by IBM
WHITE PAPER: This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Cb Endpoint Security Platform
sponsored by Carbon Black
WHITE PAPER: Discover how to stop more attacks, see more threats, and close every vulnerability your endpoints currently have. Utilize both machine learning and behavioral analytics to analyze all available endpoint data. The end result: zero-gap protection for all your endpoints.
Posted: 26 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Posted: 26 Jul 2016 | Premiered: Jun 1, 2016

AlienVault

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

The Anatomy of a Ransomware Attack
sponsored by Exabeam
RESEARCH CONTENT: Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.
Posted: 25 Jul 2016 | Published: 01 Jun 2016

Exabeam

How Strongarm's Malware Protection Solution Works
sponsored by eTECH Channel
DATA SHEET: You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

eTECH Channel

Six Steps to a Better Security Strategy
sponsored by Armor
ANALYST REPORT: This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Armor

HIPAA Compliance & Risk Management
sponsored by Armor
WHITE PAPER: Develop a proactive strategy to circumvent security problems before they occur. Learn the latest HIPAA regulation requirements to improve internal procedures and reduce threats. Understand the possible threats and formulate policies on how to protect data while conforming to the necessary regulations.
Posted: 11 Jul 2016 | Published: 31 Dec 2015

Armor

Are You a Security-First Organization?
sponsored by Armor
WHITE PAPER: Regulations are not intended to tell businesses how to structure their security efforts, they are intended to be used as a guide against which the chosen security structure can be checked. Learn how to better structure your security posture to actually protect your assets rather than just looking like you're protecting them.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Armor

Securing the Connected Car Ecosystem
sponsored by Arxan
CASE STUDY: Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Arxan

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyberthreats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

Assessing Cybersecurity Risk in a Breached World
sponsored by Infocyte
WHITE PAPER: It's imperative you include regular compromise assessments as part of your information and IT risk management strategy. Enable your operations team to catch what prevention and monitoring technologies miss, and learn how to best mitigate the possible damage that can be caused from persistent compromises before hackers make their move.
Posted: 06 Jul 2016 | Published: 01 Jun 2016

Infocyte

A Business Case For Funding Your Insider Threat Program
sponsored by Forcepoint
WHITE PAPER: Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Forcepoint

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premieres: Aug 20, 2016

AllClear ID

Three Critical Steps to Launch a Data Breach Response
sponsored by AllClear ID
WHITE PAPER: This resource highlights three critical steps in launching an effective incident response plan. Learn how to assemble a team, build communication channels with that team, draft different plans around specific incidents types and offer helpful services like identity theft protection.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

AllClear ID

What I've Learned from 5,000 Data Breaches
sponsored by AllClear ID
WHITE PAPER: As data breaches continue to increase, consumer expectations follow behind and expect well-orchestrated response time. Plan out how affected customers will be notified and supported throughout the entire data breach response process, from notification, to protection, to fraud resolution.
Posted: 29 Jun 2016 | Published: 01 May 2016

AllClear ID

Illuminating the Real Cost of Incidents from an Insurer's Perspective
sponsored by AllClear ID
WHITE PAPER: This study helps you understand the true impact of data insecurity and the real cost of incidents by consolidating claims data from multiple insurers.
Posted: 28 Jun 2016 | Published: 31 Dec 2014

AllClear ID

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

The pitfalls of two-factor authentication
sponsored by IBM
WHITE PAPER: Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.
Posted: 08 Jun 2016 | Published: 01 May 2016

IBM

Comparison Guide Email Encryption
sponsored by ZixCorp
WHITE PAPER: Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.
Posted: 01 Jun 2016 | Published: 01 May 2016

ZixCorp

Top Five CEO Wire Fraud Attacks
sponsored by Cloudmark
RESOURCE: As an attack, the CEO email wire fraud attack couldn't be simpler. There's no malware to write and no malicious code or links to implant. It's a text only email, plain and simple - but it's the social engineering that makes it work.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Cloudmark

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

What CIOs Need to Know About IoT and Security Risks
sponsored by MASERGY
ANALYST REPORT: Businesses that already have IoT initiatives have seen increased revenue around 16% last year in the areas of business affected by the effort, according to a recent study. Still, as enticing as these prospects are the question that CIOs must ask are: How secure are IoT sensors and networks?
Posted: 27 May 2016 | Published: 21 Oct 2015

MASERGY

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.
1 - 25 of 298 Matches Previous Page    1 2 3 4    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common … 
Vulnerability Assessments definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement