IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability

RSS Feed   
Network Vulnerability Reports
 
RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Endpoint Security Buyer's Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Today, virtually every organization connected to the Internet is attacked at its endpoints, and the most significant cybersecurity attacks involve at least one compromised endpoint. In this white paper, learn about the 4 main areas of endpoint security, why they are important and the essential capabilities of each.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

Tanium

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

The State of Vulnerability Response in Healthcare: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: Download this report for a look at what 322 cybersecurity professionals at healthcare firms have to say about data breaches and how your organization could benefit from end-to-end vulnerability patching.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

ServiceNow

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Knowledge is Power: The Symantec Guide to Protecting your Website
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Symantec Corporation

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement