IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
How to Build a Micro-Segmentation Strategy
sponsored by Illumio
WHITE PAPER: Learn how micro-segmentation reduces your attack surface, frustrates intruders, can be used as a compensating control against vulnerabilities, and hardens your data center.
Posted: 20 Jul 2018 | Published: 20 Jul 2018

Illumio

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

The State of Vulnerability Response in Healthcare: Patch Work Demands Attention
sponsored by ServiceNow
RESEARCH CONTENT: Download this report for a look at what 322 cybersecurity professionals at healthcare firms have to say about data breaches and how your organization could benefit from end-to-end vulnerability patching.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

ServiceNow

Getting Started with Vulnerability Mitigation
sponsored by Kaseya
RESOURCE: Find out which applications are most vulnerable to your enterprise and modernize your software and vulnerability management strategy today.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Kaseya

SCADA in the Age of Cyber-Security
sponsored by Radware
EBOOK: In this e-book, learn about the 3 critical strategic and tactical security challenges that new technologies such as IoT devices have opened SCADA environments up to, as well as the tools you can use to meet them head-on.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

Global Application and Network Security Report
sponsored by Radware
RESEARCH CONTENT: Inside Radware's 72-page Global Application and Network Security Report, security teams can use the findings and insights from this report when analyzing the threat landscape and design security strategies to protect their enterprises.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

Radware

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

Ransomware Protection: Five Best Practices
sponsored by Absolute
ANALYST REPORT: Security and risk professionals need to develop and implement the proper controls to slow and prevent the ransomware spread. In this Forrester Research Report, reveal the 5 best practices for ransomware protection.
Posted: 30 Jan 2018 | Published: 27 Jul 2017

Absolute

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: New security programs can be challenging for IT professionals. Take a look at this resource to uncover an easily deployable, reliable, threat intelligence strategy.
Posted: 10 Apr 2018 | Published: 10 Apr 2018

Cisco Umbrella

Insider's Guide to Incident Response
sponsored by AlienVault
EBOOK: 68% of respondents to a recent SAN survey cited a skills shortage as being an impediment to effective incident response.This 48-page e-book provides insight into effective incident response strategies, why they are necessary, and step-by-step improvements you can take to advance your posture.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

AlienVault
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement