IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability Assessment

RSS Feed   
Network Vulnerability Assessment Reports
 
Swinburne University of Technology Meets Its Essential 8 Mandate
sponsored by Ivanti ANZ
CASE STUDY: Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific
sponsored by Akamai Technologies
WEBCAST: Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.
Posted: 30 Jul 2020 | Premiered: Jul 30, 2020

Akamai Technologies

AI For Cybersecurity
sponsored by IronNet
WHITE PAPER: With the cost and frequency of cyberattacks expected to continue to rise, what can organizations do to meet these sophisticated threats? This white paper breaks down how artificial intelligence, when used effectively, can strengthen threat detection and response. Read on to learn more.
Posted: 23 Apr 2020 | Published: 16 Apr 2020

IronNet

Sixgill And Threat Intelligence Program Modernization
sponsored by Sixgill
PRODUCT OVERVIEW: Threat intelligence plays a vital role in not only addressing current challenges, but also proactively protecting the organization against potential or future threats. This ESG Showcase research report provides an overview of Sixgill’s threat intelligence offering, designed to help organizations address their cybersecurity imperatives.
Posted: 12 Nov 2020 | Published: 31 Oct 2020

Sixgill

Endpoint Detection and Response (EDR) for Hybrid Deployments
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

VMware International Unlimited Company

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

The State of Email Security 2020
sponsored by Mimecast
RESOURCE: It is impossible to control who is threatening your business and why, but it is possible to know how to better defend from threats by becoming more knowledgeable about how other organizations are handling them. Find out which trends are most relevant to you. Dive into this infographic for data on threat resilience and cybersecurity preparedness.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Mimecast

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

6 Security Checkpoints to Consider Along Your Organization’s Cloud Journey
sponsored by CyberArk Software, Inc
RESOURCE: Whether you’re on a journey to a public, private or hybrid cloud environment, relying on DevOps or leveraging SaaS applications, understanding cloud computing vulnerabilities is critical. In this infographic, discover 6 cloud vulnerabilities and steps for securing them.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

CyberArk Software, Inc

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info