IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 361 Matches Previous Page  |  Next Page
Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018

Tenable

Vulnerability and Threat Trends: 2018 Mid-year Update
sponsored by Skybox Security
WHITE PAPER: Keeping up with the latest threat intelligence can help you better align your 2H 2018 security strategy. Download this research report to examine trends in vulnerabilities, exploits and threats, and much more.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


Report: Financial Services Threat Landscape
sponsored by IntSights
WHITE PAPER: Prepare your organization for the future of cyberthreats. This white paper covers 5 cybersecurity predictions for 2019, global trends in cybersecurity, and much more.
Posted: 07 Aug 2018 | Published: 31 Jul 2018

IntSights

Compliance: How a Layered Approach Helps you Breeze Through Audits
sponsored by Kaseya
WHITE PAPER: In a constant sea of network threats, you must demonstrate how your network addresses a growing list of compliance requirements. Unfortunately, many organizations have challenges demonstrating compliance for both general and vertical regulations. This resource will guide you through the latest regulations and how to take it layer by layer.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Kaseya

How to Build a Micro-Segmentation Strategy
sponsored by Illumio
WHITE PAPER: Learn how micro-segmentation reduces your attack surface, frustrates intruders, can be used as a compensating control against vulnerabilities, and hardens your data center.
Posted: 20 Jul 2018 | Published: 20 Jul 2018

Illumio

Third-Party Cyber Risk: 8 Key Considerations
sponsored by RiskRecon
WHITE PAPER: Learn how to incorporate continuous monitoring into your third-party risk program, why security risk matters, and how to prioritize those risks.
Posted: 11 Jul 2018 | Published: 11 Jul 2018

RiskRecon

Five Ways Privileged Access Management Prevents Insider Threats
sponsored by HelpSystems
WHITE PAPER: Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

HelpSystems

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

A Holistic Approach to Identity and Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase so does the potential for breaches via your physical and technology access points. Learn about identity and authentication tools to ensure your enterprise is fully protected.
Posted: 11 May 2018 | Published: 11 May 2018

HID Global

A Tale of Two Teams
sponsored by Veracode, Inc.
WHITE PAPER: As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

The Printer is an Endpoint: Proactively Addressing the Security Vulnerability
sponsored by HP
WHITE PAPER: Attackers seize on the lack of attention given to printer security relative to other devices and peripherals on enterprise networks. This IDC resource highlights the vulnerable nature of printers in enterprise networks and provides steps to reduce the risk they pose to the business.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

HP

6 Steps for Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Working only to prevent and detect cyberattacks will not protect an enterprise against cybersecurity threats. Access this resource to uncover 3 challenges of building and managing a robust incident response program as well as 6 steps for overcoming these challenges and actually building a program.
Posted: 23 Mar 2018 | Published: 23 Mar 2018

IBM Resilient

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks
sponsored by Imperva
WHITE PAPER: In this white paper, learn about the vulnerabilities in the emerging cryptocurrency market, and learn about the key components of cryptocurrency defense, including web application firewalls, DDoS protection, and content delivery network services.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Imperva

It's Time for a Smarter Approach: Threat-Centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

5 critical mistakes when evaluating a next-generation firewall
sponsored by Palo Alto Networks
WHITE PAPER: Click inside to learn 5 common mistakes that occur when evaluating next-gen firewalls and how you can avoid them.
Posted: 16 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows
1 - 25 of 361 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement