IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Security Vulnerabilities

RSS Feed   
Network Security Vulnerabilities Reports
 
A New Approach to Secure Mobile Banking Apps
sponsored by Arxan
WHITE PAPER: To best secure your critical banking application, apps should be treated as an endpoint – and protection applied accordingly to prevent unprotected apps from becoming an attack vector. In this white paper, explore a new approach to app and endpoint security – with 3 transformational benefits for mobile banking apps.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Arxan

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Missing Cyberhygiene: Ransomware – Curse and Cure
sponsored by Open Systems
WHITE PAPER: Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.
Posted: 08 May 2019 | Published: 08 May 2019


What is a Vulnerability Disclosure Policy and Why Do You Need One?
sponsored by HackerOne
WHITE PAPER: Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Automation Is a Security Pro’s Best Friend
sponsored by FireMon
RESOURCE: The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

FireMon

Do You Need a WAF, or Something Better than a WAF?
sponsored by Shape Security
RESOURCE: The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.
Posted: 27 Aug 2019 | Published: 01 May 2019

Shape Security

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

Exploring Coordinated Disclosure
sponsored by Veracode, Inc.
RESEARCH CONTENT: Veracode commissioned 451 Research to gain a deeper understanding of the motivations of security researchers, actions when a vulnerability is identified, timing for disclosure, desired outcomes, how organizations structure disclosure policies, and the effectiveness of bug bounties. Read on to learn more.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Veracode, Inc.

Under the Hoodie 2019
sponsored by Rapid7
RESOURCE: Due to the sensitive nature of its findings, penetration testing is a relatively unknown, yet critical, piece of the information security puzzle. This study by Rapid7 was an effort to demystify what goes on in a typical pen test by examining 180 engagements to break down what clients and practitioners should expect to see.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Rapid7

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info