IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
51 - 75 of 661 Matches Previous Page  |  Next Page
Best Practices for Web Application Security
sponsored by White Hat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 06 May 2015 | Published: 06 May 2015

White Hat Security

Gartner Report: Instituting Layered Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this white paper and included Gartner research to learn the four phases of effective security and how you can build strong protections on each phase.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: In this webcast, a panel of experts discusses real case studies illuminating how legal and IT can collaborate to mitigate the business and legal liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Why Legal and Compliance Staff Need to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Web Security: Revenge of the Vuln
sponsored by White Hat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Limited
RESOURCE: If you want to avoid the costs of cybercrime, you need to know what you're up against. This resource can help.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Hewlett-Packard Limited

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

Strengthen your Next-Generation Malware Analysis
sponsored by Blue Coat Systems
WHITE PAPER: In this brief infographic, discover how malware analysis and content filtering can help you achieve advanced threat protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation
51 - 75 of 661 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement