IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Security Scans

RSS Feed   
Security Scans Reports
 
How Threat Modeling & Attack Simulation Works
sponsored by Coalfire
WEBCAST: In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.
Posted: 06 Jul 2020 | Premiered: Jul 6, 2020

Coalfire

ITProTV | CompTIA PenTest+: Analyze Scripts: Python
sponsored by Cornerstone OnDemand
VIDEO: This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cornerstone OnDemand

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

Evaluating a Penetration Testing Company
sponsored by InteliSecure
WHITE PAPER: Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

InteliSecure

Bluetooth Low Energy: The IoT battle
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 10 May 2018 | Published: 10 May 2018

ComputerWeekly.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Applying Machine Learning to Outstanding Network Asset Detection
sponsored by Delve
WHITE PAPER: In this white paper, learn about the concept of “Gold Nuggeting,” or how to dig for outstanding network devices using machine learning.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Delve

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Save Your Future Self With Security Now
sponsored by SearchSoftwareQuality.com
EBOOK: Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016

SearchSoftwareQuality.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info