IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Security Vulnerabilities

RSS Feed   
Security Vulnerabilities Reports
 
Microsoft Vulnerabilities Report 2019
sponsored by BeyondTrust Corporation
WHITE PAPER: The 2019 Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from 2018, analyzes the trends, and includes viewpoints from security experts. Read on to get started.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

BeyondTrust Corporation

Common and Best Practices for SOCs: Results from the 2019 Survey
sponsored by Siemplify
WHITE PAPER: In the 2019 edition of the SANS Security Operations Center (SOC) Survey, security leaders and professionals provided responses in order to better understand common barriers and best practices, where to focus to enhance security, and what to highlight when requesting additional SOC resources. Download the report to uncover the key results.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

The Total Economic Impact™ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne

Evaluating Vulnerability Assessment Solutions
sponsored by Rapid7
WHITE PAPER: Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Rapid7

SOAR-Native SOC
sponsored by D3 Security
WHITE PAPER: If you already have some detection tools and ad hoc processes, and are transforming those elements into a formal SOC, now is an optimal time to learn how to leverage a SOAR platform's capabilities. In this white paper, explore the benefits of implementing a SOAR platform into your SOC.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

D3 Security

Evaluating a Penetration Testing Company
sponsored by InteliSecure
WHITE PAPER: Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

InteliSecure

Missing Cyberhygiene: Ransomware – Curse and Cure
sponsored by Open Systems
WHITE PAPER: Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.
Posted: 08 May 2019 | Published: 08 May 2019


IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement