IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
26 - 50 of 366 Matches Previous Page  |  Next Page
The Art of Application Security: Getting Started with DevSecOps
sponsored by WhiteHat Security
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

WhiteHat Security

Vulnerable By Design: Why Destructive Exploits Keep on Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition, uncover the differences between design and typical security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

The Theory Behind Google's Beyond Corp Security Model
sponsored by Duo Security
WHITE PAPER: Google's BeyondCorp security model states no traffic within an enterprise's network is any more trustworthy by default than traffic coming in from the outside. This resource offers insight into advancing enterprise security based on Google's BeyondCorp model.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Duo Security

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017


The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017


Top Cyber Threats to the Technology Sector
sponsored by Digital Shadows
WHITE PAPER: Technology providers collect sensitive customer data, causing them to be popular targets for cyberattacks. Explore this white paper to learn about the top 4 threats facing technology companies today, and learn from recent attacks to ensure your data is secured.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

The Pressing Need for Digital Risk Management
sponsored by Digital Shadows
WHITE PAPER: According to ESG research, 69% of organizations are increasing their cybersecurity budgets. This ESP report reveals how CISOs and risk officers can adopt a thorough risk management strategy to protect their enterprise from pressing cyber threats.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

Top Cyber Threats to the Legal Sector
sponsored by Digital Shadows
WHITE PAPER: Legal firms can be attractive targets for cybercriminals, especially firms working on mergers and acquisitions (M&A), possessing a large amount of sensitive, non-public information. This paper highlights 3 security risks for legal firms to focus on and how to mitigate them.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

DNS Threats to Network Availability
sponsored by Men and Mice
WHITE PAPER: In this white paper, gain a clear understanding of how DNS redundancy can boost DNS availability to help improve the performance and reliability of your network.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Men and Mice

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


Three Reasons a Secure Web Gateway is Vital for your Security Stance
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017


From the Top: What Executives Need to Know About Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: $117,000 is the average financial impact of a data breach for SMBs in North America and $1.3 million is the average impact for a large enterprise in North America. This paper identifies 6 myths about enterprise security to help you strengthen your approach, so you do not fall victim to data breach's large financial impact.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Kaspersky Lab

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Ransomware: All Locked Up and No Place to Go
sponsored by Kaspersky Lab
WHITE PAPER: Ransomware is the digital version of extortion. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as human criminal activity itself. Explore this white paper to discover recommendations and expert tips to protect against ransomware.
Posted: 25 Sep 2017 | Published: 31 Dec 2016

Kaspersky Lab

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

Evolution of Incident Response
sponsored by IBM Resilient
WHITE PAPER: A recent survey revealed that data breach and data theft outranked natural and manmade disasters and IT system failures as the largest threat to an organization's reputation. The old days of incident response, will no longer suffice to keep your organization safe. Learn how IR has evolved and how you can improve yours.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

IBM Resilient

The Essential Checklist: A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.
Posted: 01 Sep 2017 | Published: 01 Sep 2017


Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017


PCI Compliance with Unified Security Management
sponsored by AlienVault
WHITE PAPER: Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
Posted: 19 Oct 2017 | Published: 19 Oct 2017


Planning Considerations for Compliance with GDPR
sponsored by FireMon
WHITE PAPER: If you haven't started your GDPR journey yet, now is the time. In this white paper, read about planning for GDPR compliance so that your organization does not fall victim to harsh fines.
Posted: 04 Oct 2017 | Published: 04 Oct 2017


Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012


The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017


Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks
26 - 50 of 366 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement