IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
New Topics on the New Security+ SYO-501 Exam
sponsored by Global Knowledge
RESOURCE: It has been 3 years since the last revision of the CompTIA Security+ exam. In this resource, industry expert James Michael Stewart explains the updates to the exam and everything you need to know to prepare.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Global Knowledge

Royal Bank of Scotland Reduces Phishing Susceptibility by More Than 78%
sponsored by Wombat Security Technologies
CASE STUDY: Financial institutions are highly targeted by cybercriminals. Explore this case study to gain insight into how Royal Bank of Scotland overcame the increase of malware and phishing attacks targeting their organization.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

Meltdown Spectre Mitigation with PowerShell and Process Automation
sponsored by Goverlan
WEBCAST: Uncover a deep dive into the Meltdown and Spectre security holes. This webinar details how to deploy security patches in a timely and systematic fashion on a large scale.
Posted: 02 Feb 2018 | Premiered: Jan 26, 2018

Goverlan

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

It's Time for a Smarter Approach: Threat-Centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 02 May 2018 | Published: 02 May 2018

Skybox Security

A Holistic Approach to Identity and Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase so does the potential for breaches via your physical and technology access points. Learn about identity and authentication tools to ensure your enterprise is fully protected.
Posted: 11 May 2018 | Published: 11 May 2018

HID Global

The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT: According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Absolute

Ransomware Protection: Five Best Practices
sponsored by Absolute
ANALYST REPORT: Security and risk professionals need to develop and implement the proper controls to slow and prevent the ransomware spread. In this Forrester Research Report, reveal the 5 best practices for ransomware protection.
Posted: 30 Jan 2018 | Published: 27 Jul 2017

Absolute

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows

Why Security in DevOps is Essential to Software Development
sponsored by SearchSecurity.com
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement