IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed   
Host Vulnerability Assessment Reports
 
How to Improve Your Enterprise VPN Security
sponsored by Vulcan
RESOURCE: The use of VPNs as a means to secure remote workers is nothing new. However, as social distancing and working from home become the new norm, organizations grow increasingly reliant on VPNs to maintain productivity and security. Read this article to discover 3 known VPN vulnerabilities and the steps you can take to remediate them.
Posted: 26 May 2020 | Published: 08 Apr 2020

Vulcan

Assess and Manage Cryptographic Security with Entrust Datacard™
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Entrust, Inc.

Analyst Connection: Vulnerability Management is Much More than Assessment Scanning
sponsored by ServiceNow
ANALYST REPORT: There are 2 major misconceptions about vulnerability management. Learn what they are (and much more) in this Q&A with IDC Research Director Chris Kissel.
Posted: 06 Mar 2020 | Published: 29 Feb 2020

ServiceNow

A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

SANS 2019 Threat Hunting Survey: The Differing Needs of Hunters
sponsored by DomainTools
WHITE PAPER: In this year’s SANS Threat Hunting Survey, explore how threat hunting teams are tasked in an environment, where they hunt & how they hunt. The results of the study provide several key takeaways and action items to consider adopting for your hunting program. Download the report to unlock the insights.
Posted: 31 Jan 2020 | Published: 31 Oct 2019

DomainTools

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

On-Prem SCCM Patch Management Solution - What is The True Cost Burden?
sponsored by Automox
RESOURCE: Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.
Posted: 29 Apr 2020 | Published: 17 Apr 2020


Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info