IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 
Definition continues below.
Vulnerability Assessments Reports
101 - 125 of 292 Matches Previous Page  |  Next Page
7 Ways to Tell if an Incident Response Service Provider is Right for You
sponsored by Dell SecureWorks
WHITE PAPER: View this white paper to learn more about how you can find the right incident response service provider. It outlines how to determine the vendor's capabilities and if the vendor represents the best fit based on your organizations unique needs.
Posted: 28 May 2013 | Published: 28 May 2013

Dell SecureWorks

Targeted attacks: Preparation and Mitigation
sponsored by
EGUIDE: This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013

Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by
EGUIDE: This E-Guide from details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

E-Guide: Bringing Value to Application Monitoring Through SIM
sponsored by
EGUIDE: This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

IT Security Purchasing Intentions 2013
sponsored by
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

Mobile Security Strategies
sponsored by
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

Web-facing applications: Security assessment tools and strategies
sponsored by
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by
EGUIDE: Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013


Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

Report: Cyber Security Attack and Incident Data
sponsored by IBM
WHITE PAPER: Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
Posted: 15 May 2013 | Published: 29 Mar 2013


The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Information Security Magazine - April 2013
sponsored by
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013


Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Information Security Magazine – November 2012
sponsored by Dell SonicWALL
EZINE: Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
Posted: 13 Nov 2012 | Published: 01 Nov 2012

Dell SonicWALL

Improving Tools and Techniques to Combat Malware Evolution
sponsored by Webroot
WHITE PAPER: Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes.
Posted: 09 Oct 2012 | Published: 09 Oct 2012


sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

IBM X-Force 2011 Trend and Risk Report CIO Security Priorities
sponsored by IBM
WHITE PAPER: Consult this informative white paper to learn more about the attack trends in 2011 including external network and security breaches. Discover key ways to prevent leaked customer data and inaccessible web services by analyzing the risks before it's too late.
Posted: 24 Sep 2012 | Published: 24 Sep 2012


SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012


2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard
101 - 125 of 292 Matches Previous Page    3 4 5 6 7 8    Next Page
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common … 
Vulnerability Assessments definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement