IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed   
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 

Vulnerability Assessments definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Vulnerability Assessments White Papers (View All Report Types)
1 - 25 of 106 Matches Previous Page  |  Next Page
McAfee Labs Threat Report
sponsored by McAfee
WHITE PAPER: McAfee Laps has compiled the data collected from their MVISION Insights preview dashboard and constructed a report that shows some of the top security trends from the year 2020 regarding malware, robot vulnerabilities, phishing awareness and more. Access the full report to see trends from across the world.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

McAfee

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


Evaluating Client-side Web Security: Questions to Ask Your Vendor
sponsored by Tala Security
WHITE PAPER: When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

PayDay Vulnerabilities
sponsored by Onapsis
WHITE PAPER: Financial fraud is proving to be a lucrative vulnerability for cyberattackers targeting Oracle ERP solutions. In this white paper, discover the various vectors being exploited to steal sensitive financial data and discover the Oracle patch update necessary to detect and mitigate these attacks.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

Onapsis

Avert Cyber Attacks with Proactive Endpoint Hardening
sponsored by Automox
WHITE PAPER: The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

Enhancing Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Learn how ServiceNow can help your organization achieve faster vulnerability response rates, improve operational transparency, and create a more digitally secure working environment for all.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

ServiceNow

Cyber Risk Spotlight Report: 11 Metrics to Watch
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security
1 - 25 of 106 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info