IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 365 Matches Previous Page  |  Next Page
Cyber Resilience in the Modern SOC: Why Detection and Prevention is Not Enough
sponsored by IBM Resilient
WHITE PAPER: Organizations are failing at early breach detection, with more than 80% of breaches undetected by the breached organization, according to Gartner. This resource explores cyber resilience in the modern SOC and reveals why detection and prevention is no longer enough for effective security.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

IBM Resilient

A Guide to Mitigating Cloud Security Risks Via Configuration and Vulnerability Analysis
sponsored by Amazon Web Services
WHITE PAPER: When it comes to cloud security, what you don't know can hurt you. Leverage this custom article to uncover how to mitigate cloud security risks via configuration and vulnerability analysis.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Amazon Web Services

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Enabling and Securing Digital Transformation
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn the specific challenges facing your organizations security capabilities and what's at stake. Then, evaluate how a comprehensive identity and access management system can help you minimize the threats to your environments.
Posted: 02 Feb 2018 | Published: 31 Dec 2016

CA Technologies

Shedding Light on the Cloud App Visibility Blind Spot
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how the risk posed by shadow IT has grown, as well as why traditional controls and security policies don't address account-centric threats. Then explore 3 criteria organizations should consider to address the visibility blind spots between themselves and their cloud providers.
Posted: 01 Feb 2018 | Published: 01 Feb 2018


Building Your Data Loss Prevention Strategy and Process
sponsored by Forcepoint
WHITE PAPER: Use this guide to discover the 7 key points you need to understand as you organize your data loss prevention (DLP) project and roll out your DLP program at every phase of deployment.
Posted: 30 Jan 2018 | Published: 30 Jan 2018


Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: Read this white paper to find out what new security concerns are driving the need for risk adaptive protection. Then learn about a data protection method that focuses on people for visibility into the data they create and the applications they use.
Posted: 29 Jan 2018 | Published: 29 Jan 2018


The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018


The New World of Endpoint Security: Traditional Signature-Based Malware and Virus Protection Can't Keep Up
sponsored by Carousel Industries
WHITE PAPER: As cyberattacks develop in complexity, traditional anti-virus and malware protection is no longer the most effective security approach. Explore this white paper to gain insight into an advanced endpoint security strategy and how machine learning can enhance malware protection.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Carousel Industries

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018


Assumption of Breach: A New Approach to Cyber Security
sponsored by Carousel Industries
WHITE PAPER: According to an RSA Survey, 75% of companies have significant cybersecurity risk exposure. This white paper reveals how a layered approach to cybersecurity can help with turning 3 key elements—people, processes and technology—from security vulnerabilities to strengths.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Carousel Industries

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The Art of Application Security: Getting Started with DevSecOps
sponsored by WhiteHat Security
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

WhiteHat Security
1 - 25 of 365 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement