IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 606 Matches Previous Page  |  Next Page
Threat Ladscape Report
sponsored by Fortinet, Inc.
RESOURCE: According to the Fortinet Threat Landscape Report, in Q3 of 2017 alone, there were 14,904 unique variants of malware. Explore this 28-page Threat Landscape Report to uncover staggering statistics regarding exploits, malware, and botnets and how you can use the current trends to improve your threat management security posture.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

Fortinet, Inc.

Executing a Lockdown on Cybersecurity Threats
sponsored by Navex Global
EBOOK: Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global

4 Questions Every Information Security Leader Must Answer
sponsored by Symantec
EBOOK: As a leader of security within your organization, it's your job to combat attacks and mitigate the damage. This e-book offers 4 questions every information security leader must answer to determine the strength of your organization's security across every stage of an attack lifecycle.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Symantec

Trends in Global Cybersecurity
sponsored by Microsoft
EBOOK: New transformations in the IT landscape have dramatically changed the way we're targeted by cybercriminals. Read this e-book to learn the top 10 trends in cybersecurity today.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Microsoft

2018 Top 10 Business Intelligence Trends
sponsored by Tableau Software
RESOURCE: Business intelligence platforms are constantly evolving, so whether you're rockstar or an IT hero, you need to know these top 10 business intelligence trends for 2018.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Tableau Software

How to Avoid Being the Victim of a Data Breach
sponsored by Evident
WEBCAST: There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017

Evident

Staying Secure is All About Keeping One Step Ahead
sponsored by BT
WEBCAST: With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017

BT

Securing the Digital Enterprise
sponsored by BT
WHITE PAPER: Cybersecurity dominates the media and the chances of a business or an individual becoming a victim have never been greater. This white paper provides a practical guide to organizations on their journey to using security as a business enabler as well as offering useful checklists for those who are already on their journey to protection.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

BT

7 Key Security Controls for Compliant Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: According to a recent study, organizations are increasing cloud spending 20% year over year, and more than 3/4s of firms are piloting, implementing or already operating in the cloud today. Take a look at this article to uncover 7 key security controls for compliant workloads in order to advance your cloud security.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

CloudPassage

The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Evident

Achieve Security and Compliance in the Cloud Without Breaking the Bank
sponsored by Alert Logic
RESOURCE: Take a closer look at this infographic to uncover how IT professionals from 4 large sized companies implemented a security-as-a-service approach without breaking the bank.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Alert Logic

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

How Quantum Computing Will Change Browser Encryption
sponsored by F5 Networks
WHITE PAPER: This threat intelligence report provides insight into how quantum computing will affect the current global encryption standard, the Transport Layer Security (TLS), formerly known as SSL.
Posted: 21 Nov 2017 | Published: 13 Jul 2017

F5 Networks

DDoS: Strategies for Dealing With a Growing Threat
sponsored by A10 Networks
WHITE PAPER: In 2015, 10% of average DDoS attacks were above 50 Gbps. Today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

A10 Networks

Case Study: Incident Response Time Savings and Compliance Ease
sponsored by Rapid 7
CASE STUDY: This case study explores how energy provider, Energie Suedbayern (ESB), overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by bringing vulnerability management together with an incident detection response strategy.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

How to Secure your Network Smarter and Faster
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, learn about Junos Space Security Director. It's a solution that allows network administrators to monitor applications and users and remediate security threats faster across all firewalls.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days
sponsored by ServiceNow
WEBCAST: When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

Case Study: How Seton Hall University Improved Vulnerability Management
sponsored by ServiceNow
WEBCAST: Inside this case study, Seton Hall University faced many challenges related to prioritizing and responding to the most critical vulnerabilities. Dive into how Seton Hall University overcame these challenges and became proactive in remediating vulnerabilities.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

DNS Threats to Network Availability
sponsored by Men and Mice
WHITE PAPER: In this white paper, gain a clear understanding of how DNS redundancy can boost DNS availability to help improve the performance and reliability of your network.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Men and Mice

Protecting Endpoints Everywhere
sponsored by Cisco Umbrella
EBOOK: In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella
1 - 25 of 606 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement