IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Internet Security Vulnerabilities

RSS Feed   
Internet Security Vulnerabilities White Papers (View All Report Types)
 
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organizations can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint

A New Approach to Secure Mobile Banking Apps
sponsored by Arxan
WHITE PAPER: To best secure your critical banking application, apps should be treated as an endpoint – and protection applied accordingly to prevent unprotected apps from becoming an attack vector. In this white paper, explore a new approach to app and endpoint security – with 3 transformational benefits for mobile banking apps.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Arxan

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
sponsored by Cymulate
WHITE PAPER: Organizations of all shapes and sizes are fighting a war against threat actors. Currently, organizations use vulnerability scans and penetration tests to verify that their data is protected. However, a targeted attack simulation may be a better test for your organization. Download this white paper to learn more about targeted attack simulations.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Cymulate

Are Your Security Controls Yesterday's News?
sponsored by Cymulate
WHITE PAPER: To find potential threats, many organizations have resorted to testing their security controls using a handful of common, "modern" methods. However, there are often limits that make these tests less effective. In this white paper, learn how a true threat actor simulation can properly test your security controls.
Posted: 19 Jul 2019 | Published: 31 Jul 2019

Cymulate

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement