IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed   
Host Vulnerability Assessment Reports
 
The Four Pillars of Modern Vulnerability Management
sponsored by Rapid7
WHITE PAPER: In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Rapid7

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

The Total Economic Impact™ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7

Exploring Coordinated Disclosure
sponsored by Veracode, Inc.
RESEARCH CONTENT: Veracode commissioned 451 Research to gain a deeper understanding of the motivations of security researchers, actions when a vulnerability is identified, timing for disclosure, desired outcomes, how organizations structure disclosure policies, and the effectiveness of bug bounties. Read on to learn more.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Veracode, Inc.

Key Protection with Intertrust whiteCriterion Secure Key Box
sponsored by Intertrust
WHITE PAPER: Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.
Posted: 16 Dec 2019 | Published: 31 Aug 2018

Intertrust

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 24 Oct 2019 | Published: 22 Oct 2019

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info