IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
2017 Application Security Statistics Report
sponsored by Whitehat Securities
RESOURCE: According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Whitehat Securities

Vulnerable By Design: Why Destructive Exploits Keep On Coming
sponsored by enSilo
WHITE PAPER: Attackers can exploit design vulnerabilities and gain root access to highly secure systems leading to data theft, disruption of critical infrastructure and more. Explore this resource to gain insight into design vulnerabilities and malware which exploit them. In addition uncover the differences between design and security vulnerabilities.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Building Your Data Loss Prevention Strategy and Process
sponsored by Forcepoint
WHITE PAPER: Use this guide to discover the 7 key points you need to understand as you organize your data loss prevention (DLP) project and roll out your DLP program at every phase of deployment.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Forcepoint

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


How to Send DNS Over Anything: Encrypted
sponsored by Men and Mice
WEBCAST: In this webcast, gain a better understanding of DNS security protocols available to help increase your organization's network performance and reliability. Then, uncover examples of configurations on how to use the new privacy protocols.
Posted: 06 Nov 2017 | Premiered: Sep 8, 2017

Men and Mice

Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Duo Security

Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response
sponsored by Dell and Intel
DATA SHEET: Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more.
Posted: 25 Jan 2018 | Published: 30 Nov 2017

Dell and Intel

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

2018 Security Predictions for an Unpredictable World
sponsored by Whitehat Securities
VIDEO: Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

Whitehat Securities

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement