IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Security Vulnerabilities

RSS Feed   
Network Security Vulnerabilities Reports
 
In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

Fidelis Endpoint : A Technical Deep Dive
sponsored by Fidelis
PRODUCT OVERVIEW: In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Network Changes: Dealing with “The Only Constant”
sponsored by SolarWinds, Inc.
EBOOK: Your network isn't static. It's a dynamic, living entity that is constantly changing. But, if these changes aren't implemented right, it can have catastrophic results. Find out how to manage the changes in your network environment effectively and seamlessly.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

SolarWinds, Inc.

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 24 Oct 2019 | Published: 22 Oct 2019

ServiceNow

PayDay Vulnerabilities
sponsored by Onapsis
WHITE PAPER: Financial fraud is proving to be a lucrative vulnerability for cyberattackers targeting Oracle ERP solutions. In this white paper, discover the various vectors being exploited to steal sensitive financial data and discover the Oracle patch update necessary to detect and mitigate these attacks.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

Onapsis

Mission Accepted Reconnaissance & Vulnerability Scanning in Uncharted Terrain
sponsored by ProAct
WHITE PAPER: Managing enterprise cybersecurity is like a jungle – the jungle may feel quiet and serene, but the peace can be broken at any moment, so all systems should be tested to make sure they can withstand attack. Read on to continue the jungle warfare analogy and discover the benefits of a strategy that balances offensive and defensive tactics.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

ProAct

Rackspace & Alert Logic Enhance Cybersecurity for Amazon Web Services Customers
sponsored by Rackspace
RESOURCE: Cloud security remains a persistent challenge among SMB and mid-market organizations, due to the skills gap. In this blog post, take a closer look at Rackspace’s partnership with Alert Logic to address this skills gap and provide cloud users with a Security Review program to assess the strength of their security.
Posted: 25 Feb 2020 | Published: 27 Jan 2020

Rackspace

Penetration Testing vs. Vulnerability Scanning
sponsored by Acunetix
RESOURCE: Businesses often perceive vulnerability scanning as an alternative to penetration testing. But the truth is, these security assessments are very different. Tap into this blog to understand the differences between vulnerability scanning and penetration testing and how often they should be performed.
Posted: 28 May 2020 | Published: 28 May 2020

Acunetix

Hybrid IT-OT Security Management
sponsored by Skybox Security
WHITE PAPER: OT and IT environments have historically been managed and secured separately to focus on the unique vulnerabilities that plague each environment. However, a unified approach that combines IT and OT environments positions organizations to identify and combat threats most effectively. Read on to learn more about this hybrid approach.
Posted: 22 Apr 2020 | Published: 07 Apr 2020

Skybox Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info