IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Internet Security Vulnerabilities

RSS Feed   
Internet Security Vulnerabilities Reports
 
Swinburne University of Technology Meets Its Essential 8 Mandate
sponsored by Ivanti ANZ
CASE STUDY: Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen provider should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation

Paradise Lost: Exploiting the New Distributed Workforce Economy
sponsored by Tanium
WHITE PAPER: Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.
Posted: 24 Aug 2020 | Published: 02 Jun 2020

Tanium

The Beginner’s Guide to Bug Bounty Programs
sponsored by HackerOne
WHITE PAPER: In The Beginners’ Guide to Bug Bounty Programs, discover how organizations including Starbucks, Airbnb, GitHub, Hyatt, Nintendo and Google Play are working with hackers to protect their customers and brands.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

HackerOne

Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

McAfee MVISION Insights
sponsored by McAfee
DATA SHEET: Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.
Posted: 21 Oct 2020 | Published: 31 Jul 2020

McAfee

TCO Study of WSUs and SCCM
sponsored by Automox
WHITE PAPER: Patch management plays a critical role in ensuring systems are operating properly and protected against attacks. However, like most technology functions, modern enhancements allow organizations to transition from on-premise systems to cloud-based SaaS offerings – but does the SaaS switch make fiscal sense? Read on to find out.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info