IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability

RSS Feed   
Network Vulnerability Reports
 
Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Vendor Analysis: Managed Security Services, Worldwide
sponsored by Verizon
ANALYST REPORT: MSSPs increasingly offer a wider and more varied set of services; however, Gartner has found most clients are primarily interested in contracting MSSPs for 24/7 remote security event monitoring and response services. In Gartner's Major Quadrant for Managed Security Services, explore strengths and cautions of vendors in the market.
Posted: 26 Aug 2019 | Published: 02 May 2019

Verizon

The Challenges & Urgency of Managing Third-Party Risk
sponsored by BitSight
WHITE PAPER: Managing cyberthreats is becoming more challenging and urgent as businesses expand their ecosystems through their reliance on third parties. As a result, cyberthreats are top concerns for modern organizations worldwide. In this white paper, learn how organizations can better manage their third-party risk.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

BitSight

Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset
sponsored by IBM
WHITE PAPER: The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

IBM

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

High Alert on Cyber-Risk and Cyber-Security Preparedness
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

SurfWatch Labs

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement