IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Security Vulnerabilities

RSS Feed   
Network Security Vulnerabilities Reports
 
AWS Security Review by Rackspace and Alert Logic
sponsored by Rackspace
RESOURCE: This infographic provides an overview of Rackspace and Alert Logic’s free cybersecurity review. The goal of the review is to establish a clear understanding of the vulnerabilities within your AWS environment and compare those with industry benchmarks. Read on to learn more about the benefits of participating and find answers to FAQs.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Rackspace

Best Practices for Securing Critical Infrastructure for State & Local Governments
sponsored by VMware International Unlimited Company
WHITE PAPER: For state and local governments, managing cyberthreats and ensuring election security is made even more difficult by the lack of resources available. This white paper underlines the importance of government cybersecurity and highlights 10 best practices agencies can implement to better protect themselves and those they govern.
Posted: 07 May 2020 | Published: 31 Jan 2020

VMware International Unlimited Company

COVID-19: Keeping Your Vulnerability Management Program on Track
sponsored by Vulcan
RESOURCE: As organizations shift towards remote working models to promote social distancing, vulnerability management programs are likely experiencing disruption. While there are significant challenges with remote work, the current situation doesn’t come without benefits for vulnerability management programs. Read this blog post to find out what they are.
Posted: 28 May 2020 | Published: 26 Mar 2020

Vulcan

Vulnerability Management 2020 Navigating to New Heights
sponsored by Vulcan
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

Vulcan

Evaluating Client-side Web Security: Questions to Ask Your Vendor
sponsored by Tala Security
WHITE PAPER: When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

2020 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT: In 2019, 93.6% of malware detected was only seen on a single PC. This is significant because it shows that it only takes one mistake from one employee to compromise a network. Organizations are looking for ways to defend against threats, but to do so, they must first know their enemy. Read this threat report to see the statistics of cybersecurity.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan

Incorporating Technology to Mitigate Email Exploits and Human Error
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.
Posted: 10 Jun 2020 | Published: 31 May 2020

Egress Software Technologies Inc

The State of Cloud Security 2020
sponsored by Sophos
ANALYST REPORT: To understand the balance between flexibility and vulnerability in the public cloud, a survey of 3,251 IT managers across 26 countries was conducted. The study shows the ways in which attackers are changing the rules to find new ways into environments and exposing security gaps that were once unknown. Read the full report to go in-depth.
Posted: 10 Sep 2020 | Published: 31 Jul 2020

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info