IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
76 - 100 of 581 Matches Previous Page  |  Next Page
An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Understanding the Risks of Content Management Systems
sponsored by IBM
WHITE PAPER: This white paper explores the dangers of CMS platforms and explains how you can take advantage of CMS without putting your security at risk.
Posted: 11 Sep 2015 | Published: 31 May 2015


How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015


Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

Research Reveals How 12 Managed Security Services Options Compare
sponsored by IBM
WHITE PAPER: This analyst report evaluates 12 leading MSSPs' strengths, weaknesses, and capabilities, including offerings from IBM, Verizon, HP, Dell, Symantec, and other major players in the industry. View now to learn how these providers stack up on criteria including the following: threat intelligence, pricing, customer experience, and more.
Posted: 21 Apr 2015 | Published: 11 May 2015


Using Threat Intelligence to Manage Risk
sponsored by Anomali
EGUIDE: As threats and attackers continue to advance at a rapid pace, threat intelligence has become crucial. Discover the benefits of adding threat intelligence to an established information security program.
Posted: 09 Apr 2015 | Published: 09 Apr 2015


Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015


Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: Explore a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. Access this brief webcast to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015


The State of Mobile Application Insecurity
sponsored by IBM MaaS360
WHITE PAPER: This research report conducted by Ponemon Institute examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM MaaS360

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015


Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation

Automating App Blacklisting
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.
Posted: 01 Apr 2015 | Published: 04 Feb 2015

Veracode, Inc.

Anomaly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WHITE PAPER: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Published: 24 Jan 2015


Keep Your Customers Safe from Phishing
sponsored by Symantec Website Security Solutions
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Website Security Solutions

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more. Read it now to discover how these two programs compare.
Posted: 19 Mar 2015 | Published: 04 Nov 2013


Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015


Information Security Magazine – The Hunt for Data Analytics
sponsored by
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015
76 - 100 of 581 Matches Previous Page    2 3 4 5 6 7    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement