IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 355 Matches Previous Page  |  Next Page
Cyber Attack Security Guide
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: With attacks and threats growing by the minute, so are preventative tactics to block these attacks. Download this white paper that guides you through the 5 steps needed to prevent attacks and the immediate response protocol for containing them.
Posted: 18 Jun 2018 | Published: 31 Dec 2017

Check Point Software Technologies Ltd.

The Importance of Kerberos Decryption
sponsored by CyberArk Software, Inc
WHITE PAPER: In this white paper, learn how decrypting Kerberos can help bring previously inaccessible data into the light, and uncover the malicious activity hidden within. Then read on to learn about how you can decrypt this program in a simple 3-step process.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

CyberArk Software, Inc

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

A Holistic Approach to Identity and Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase so does the potential for breaches via your physical and technology access points. Learn about identity and authentication tools to ensure your enterprise is fully protected.
Posted: 11 May 2018 | Published: 11 May 2018

HID Global

A Tale of Two Teams
sponsored by Veracode, Inc.
WHITE PAPER: As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

It's Time for a Smarter Approach: Threat-Centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

The Printer is an Endpoint: Proactively Addressing the Security Vulnerability
sponsored by HP
WHITE PAPER: Attackers seize on the lack of attention given to printer security relative to other devices and peripherals on enterprise networks. This IDC resource highlights the vulnerable nature of printers in enterprise networks and provides steps to reduce the risk they pose to the business.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

HP

Security for Containers – 5 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: For security departments, adoption of containerization presents a multifaceted challenge. This resource reveals 5 things DevOps should know about securing containerized applications.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Aqua Security

Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017

Radware

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

5 Critical Mistakes to Avoid When Evaluating a Next-Gen Firewall
sponsored by Palo Alto Networks
WHITE PAPER: Click inside to learn 5 common mistakes that occur when evaluating next-gen firewalls and how you can avoid them.
Posted: 16 Feb 2018 | Published: 31 Dec 2017

Palo Alto Networks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Before making a SIEM purchasing decision, read this buyer's guide which outlines the 9 technical capabilities no modern system should go without. Then learn what Splunk has to offer not only as a SIEM but as a data analytics tool for your entire IT system.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

BitSight

Contingent Workers
sponsored by Identity Automation
WHITE PAPER: By 2020, approximately 40% of the average company's total workforce is expected to be contingent workers. The rise in contingent workers brings an insider security risk. Insiders are by far the weakest link in most organizations' security model. Take a look at this e-book and learn more about the threats insiders pose to your organization.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

The Art of Application Security: Getting Started with DevSecOps
sponsored by WhiteHat Security
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

WhiteHat Security

Vulnerable By Design: Why Destructive Exploits Keep on Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition, uncover the differences between design and typical security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows
1 - 25 of 355 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement