IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed   
Host Vulnerability Assessment Reports
 
Automated Assurance is Key to the Automation of 5G and SD-WAN Operations
sponsored by Spirent
WHITE PAPER: 5G and SD-WAN are significant emerging technologies hitting the market. However, as operations automation becomes more pervasive, these technologies will need to be rigorously checked for vulnerabilities. Luckily, automation can help. Read this white paper to understand automated assurance.
Posted: 15 Oct 2020 | Published: 31 Mar 2019

Spirent

Cyber Hygiene: If Tools Could Talk
sponsored by Merlin International
WHITE PAPER: The complexity of today’s IT infrastructures coupled with security tool fragmentation and misconfiguration makes cyber hygiene challenging for companies of all sizes. Download this white paper to learn more about how your organization can improve its cyber hygiene by conducting a self-evaluation of your current posture.
Posted: 29 May 2020 | Published: 15 May 2020

Merlin International

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

Endpoint Detection and Response (EDR) for Hybrid Deployments
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

VMware International Unlimited Company

The New Workplace: Re-Imagining Work After 2020
sponsored by Okta
ANALYST REPORT: For this report, 6,000 office workers across the UK, Germany, France and the Netherlands were surveyed. The questions revolved around their readiness to work from home, their employers’ remote security, and the change in culture that comes with working remotely. Read on to see how their perceptions compare to your own.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Okta

DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?
sponsored by Akamai Technologies
RESOURCE: Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Akamai Technologies

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

The Truth After the Hype: Improve Mobile Data Security
sponsored by vmware airwatch
EGUIDE: In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

vmware airwatch
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info