IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerabilities

RSS Feed   
Vulnerabilities Reports
 
In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

Network security: public enemy number one
sponsored by ComputerWeekly.com
EGUIDE: In addition to regular network workloads, 83% of network teams also support security teams with the assorted network security issues that organisations face today. Discover in this e-guide why network security is the public enemy number one.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

ComputerWeekly.com

PayDay Vulnerabilities
sponsored by Onapsis
WHITE PAPER: Financial fraud is proving to be a lucrative vulnerability for cyberattackers targeting Oracle ERP solutions. In this white paper, discover the various vectors being exploited to steal sensitive financial data and discover the Oracle patch update necessary to detect and mitigate these attacks.
Posted: 17 Apr 2020 | Published: 17 Apr 2020

Onapsis

For Dummies: Digital Transformation and Risk, ServiceNow Special Edition
sponsored by ServiceNow
EBOOK: In this For Dummies e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

ServiceNow

Five Stages to Create A Closed-Loop Security Process with MITRE ATT&CK
sponsored by Cybereason
WHITE PAPER: Prior to MITRE ATT&CK, a security framework that allowed for realistic testing and provided a basis for improvement of security operations process and technology didn’t fully exist. In this white paper, discover the key components of the MITRE ATT&CK framework and 5 stages for creating a closed-loop security process.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Cybereason

Risk-Based Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Traditional vulnerability management was a bit like whack-a-mole: It relied on actively monitoring an environment for threats, then moving in to patch them as soon as they popped up. But what if you had the context to know where the ‘moles’ were most like pop up, and when? Read on to learn about this unique approach.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

Skybox Security

Pros and Cons of Patching With WSUS
sponsored by Automox
RESOURCE: Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.
Posted: 13 Apr 2020 | Published: 31 May 2019


IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 12 May 2020 | Published: 12 May 2020

Dell Technologies

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info