IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
Implementing Agile Security Response
sponsored by ServiceNow
WHITE PAPER: Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.
Posted: 04 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
ServiceNow

Securing Open Source, Part 1 & 2
sponsored by WhiteSource
RESEARCH CONTENT: In this report, explore how the boom in open source software (OSS) has led to an increased awareness of open source risks, from licensing issues to security – and the measures that are required to protect organizations against those risks.
Posted: 08 Jan 2019 | Published: 07 Sep 2018

TOPICS: 
WhiteSource

Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
EBOOK: This e-book details a comprehensive set of criteria to customize your evaluation to your organization's security needs and how to determine your ROI when deploying your two-factor authentication tools.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

TOPICS: 
Duo Security

Five Ways Privileged Access Management Prevents Insider Threats
sponsored by HelpSystems
WHITE PAPER: Over a quarter of attacks are perpetrated by insiders, according to The Verizon Data Breach Report (2018) and threats coming from the inside are notoriously tough to spot. Find out how you can determine a potential threat without preventing employees from accessing the data they need to do their jobs.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

TOPICS: 
HelpSystems

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

TOPICS: 
Fortinet, Inc.

Solving the Cybersecurity Skills Shortage
sponsored by Arctic Wolf
WEBCAST: 22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
Posted: 10 Aug 2018 | Premiered: Aug 10, 2018

TOPICS: 
Arctic Wolf

Endpoint Security Buyer's Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Today, virtually every organization connected to the Internet is attacked at its endpoints, and the most significant cybersecurity attacks involve at least one compromised endpoint. In this white paper, learn about the 4 main areas of endpoint security, why they are important and the essential capabilities of each.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

TOPICS: 
IBM

Why Security in DevOps is Essential to Software Development
sponsored by SearchSecurity.com
EBOOK: What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

TOPICS: 
SearchSecurity.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

TOPICS: 
IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement