IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed   
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 

Vulnerability Assessments definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Vulnerability Assessments White Papers (View All Report Types)
1 - 25 of 115 Matches Previous Page  |  Next Page
Driving Resiliency and Security in the Financial Services Industry
sponsored by BMC
WHITE PAPER: Resiliency is critical to the long-term success of the financial services industry. This is due to the amount of sensitive personal and financial data they manage that have attracted increasingly sophisticated cyberattack methods. Read on to discover best practices for ensuring security and resiliency of t financial services organizations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

Prioritizing Network Vulnerabilities: A Survey and Comparison of Today’s Options
sponsored by Delve
WHITE PAPER: In the current network security climate, there are three methods organizations can use to assess whether they are putting their eggs in the right baskets when it comes to vulnerability. Browse this white paper to get a closer look at these methods and see which can be best employed in your department.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

7 Ways AI Can Automate and Improve Vulnerability Management Operations
sponsored by Delve
WHITE PAPER: Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Help Developers Understand and Use the OWASP Top Ten
sponsored by IANS Research
WHITE PAPER: Each year, the Open Web Application Security Project (OWASP) publishes Top Ten list of common and critical web application security risks. This white paper provides an overview of the Top Ten, why it matters, and best practices for incorporating it into your workday. Read on to get started.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

IANS Research

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

Vulnerability Management 2020 Navigating to New Heights
sponsored by Vulcan
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

Vulcan

Remediation Campaigns: The Strategy Behind Effective Vulnerability Management
sponsored by Vulcan
WHITE PAPER: In this white paper, explore the 3 campaign strategies that can help organizations improve the efficiency of their vulnerability remediation programs.
Posted: 18 May 2020 | Published: 18 May 2020

Vulcan

The Business Case for Vulnerability Remediation Automation
sponsored by Vulcan
WHITE PAPER: Find out how your organization can reduce spending by investing in more efficient vulnerability remediation processes.
Posted: 18 May 2020 | Published: 18 May 2020

Vulcan

Automating Your Vulnerability Remediation Process
sponsored by Vulcan
WHITE PAPER: The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.
Posted: 15 May 2020 | Published: 30 Jun 2019

Vulcan

Justify Your Vulnerability Management Program
sponsored by Vulcan
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

Vulcan

The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making
sponsored by Vulcan
WHITE PAPER: Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.
Posted: 14 May 2020 | Published: 14 May 2020

Vulcan

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

AI For Cybersecurity
sponsored by IronNet
WHITE PAPER: With the cost and frequency of cyberattacks expected to continue to rise, what can organizations do to meet these sophisticated threats? This white paper breaks down how artificial intelligence, when used effectively, can strengthen threat detection and response. Read on to learn more.
Posted: 23 Apr 2020 | Published: 16 Apr 2020

IronNet

Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK
sponsored by Cybereason
WHITE PAPER: Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Cybereason

How Vendor Email Compromise Works
sponsored by Armorblox
WHITE PAPER: The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Armorblox

Avert Cyber Attacks with Proactive Endpoint Hardening
sponsored by Automox
WHITE PAPER: The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

Evaluating Vendor Risk Management
sponsored by Atlassian
WHITE PAPER: As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Atlassian
1 - 25 of 115 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info