IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

How the Rapid Adoption of Public Clouds is Affecting Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Companies are increasingly moving data and applications to public cloud platforms. However, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. In this white paper, learn how public clouds demand particular attention from IT security managers for 3 reasons.
Posted: 28 Feb 2019 | Published: 28 Sep 2018

Fortinet, Inc.

Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking
sponsored by RSA Conference
WEBCAST: Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.
Posted: 31 Jul 2019 | Premiered: Mar 5, 2019

RSA Conference

What is an Ounce of Cybersecurity Prevention Worth?
sponsored by Verizon
RESOURCE: Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.
Posted: 23 May 2019 | Published: 11 Feb 2019

Verizon

Double Kill, Other Favored Exploits, and How to Patch Against Them
sponsored by Webroot
PODCAST: Tune into this podcast where Hacker Files host Joe Panettieri talks with Webroot analysist Tyler Moffit about patching against the remote code execution flaw Double Kill and other exploits.
Posted: 06 Aug 2019 | Premiered: Aug 6, 2019

Webroot

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Introduction to Claroty
sponsored by Claroty
WEBCAST: In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.
Posted: 27 Sep 2019 | Premiered: Sep 27, 2019

Claroty
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement