IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Risk Assessment

RSS Feed   
ALSO CALLED: Assessing Risk
DEFINITION: Evaluating the risks of information loss based on an analysis of threats to, and vulnerabilities of, a system, operation or activity.
Risk Assessment Reports
1 - 25 of 413 Matches Previous Page  |  Next Page
The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Your Guide to Mastering Vulnerability Remediation
sponsored by Vulcan
RESOURCE: In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.
Posted: 21 May 2020 | Published: 06 May 2020

Vulcan

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identity, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

Vulnerability Management 2020 Navigating to New Heights
sponsored by Vulcan
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

Vulcan

Your Vulnerability Management Process Isn't Working
sponsored by Vulcan
RESOURCE: When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.
Posted: 19 May 2020 | Published: 21 Mar 2019

Vulcan

Vulnerability Metrics - Which Matter and Which Don't
sponsored by Vulcan
RESOURCE: Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.
Posted: 19 May 2020 | Published: 01 Nov 2018

Vulcan

Cognitions of a Cybercriminal
sponsored by VMware International Unlimited Company
WHITE PAPER: Cybercriminals grow increasingly creative each year, finding new ways to bypass security methods without detection. This white paper is designed to help CISOs in their pursuit of cybercriminals by offering an inside look into the mindset of their behavior and breaking down their attack patterns. Access now to reserve your copy.
Posted: 15 May 2020 | Published: 31 Jul 2019

VMware International Unlimited Company

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

Automating Your Vulnerability Remediation Process
sponsored by Vulcan
WHITE PAPER: The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This whitepaper provides a set of examples and uses cases for what to do. Read on to get started.
Posted: 15 May 2020 | Published: 30 Jun 2019

Vulcan

Justify Your Vulnerability Management Program
sponsored by Vulcan
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

Vulcan

The Top 5 Mistakes That Everyone in Vulnerability Remediation is Making
sponsored by Vulcan
WHITE PAPER: Cyberattackers are growing cleverer with each passing year, exposing new vulnerabilities and exploiting old ones to cause costly and disruptive breaches. Its time for organizations to fight back. In this white paper take a closer look at the top five most common mistakes in vulnerability management and how to avoid them.
Posted: 14 May 2020 | Published: 14 May 2020

Vulcan

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

On-Prem SCCM Patch Management Solution - What is The True Cost Burden?
sponsored by Automox
RESOURCE: Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.
Posted: 29 Apr 2020 | Published: 17 Apr 2020


Cortex XDR: Breaking the Security Silos for Detection and Response
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: Although dealing with threats and vulnerabilities is stressful, managing the repetitive tasks associated with incident detection and response is arguably an equally frustrating responsibility. This white paper highlights the key capabilities of Cortex XDR, designed to alleviate this process by automating certain tasks. Read on to learn more.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Palo Alto Networks

An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes
sponsored by Thales
WHITE PAPER: A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Thales

Smart Automation for Security Policy Management
sponsored by Skybox Security
WHITE PAPER: Gartner predicts that by the end of 2020 as many as 99% of firewall breaches will be a result of misconfigurations rather than software issues. To address misconfigurations, security teams are turning to analytics-driven automation tools. Read on to learn more about their capabilities & how they can help meet your security needs.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Skybox Security

2019 eSentire Annual Threat Intelligence Report
sponsored by eSentire
ANALYST REPORT: Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. Download this report to learn what attacks are targeting mid-sized organizations and the security strategies you need to safeguard your business.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

eSentire

Third-Party Risk to the Nth Degree
sponsored by eSentire
WHITE PAPER: Third-party vendor ecosystems are not a new area of cyber risk, yet the subject still fails to be a top priority for many organizations. In this white paper, explore quantitative and contextual measures by which your organization can compare current practices and investments to help mitigate third-party cyber risk.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

eSentire

COVID-19 App Supplier Risk
sponsored by Syniti
PRODUCT DEMO: Watch this brief video to learn how you can use Syniti’s app to track and manage your supplier risk in times of uncertainty.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Syniti

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
WHITE PAPER: The rapid evolution of IT has changed the face of the network perimeter. Devices are proliferating more quickly than most organizations can keep up. The result is an incredibly complex network that introduces significant business risk. In this white paper, learn how next-generation firewalls can help reduce this risk.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Palo Alto Networks

Skybox Security Overview
sponsored by Skybox Security
VIDEO: This short video highlights the key capabilities of the Skybox Security Suite, which offers functionalities that range from vulnerability and threat management to firewall and security policy management. Learn more about the suite now, and see if it’s a good fit for your needs.
Posted: 23 Apr 2020 | Premiered: 15 Apr 2019

Skybox Security
1 - 25 of 413 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info