IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed   
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 

Vulnerability Assessments definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Vulnerability Assessments Reports
26 - 50 of 238 Matches Previous Page  |  Next Page
State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Making Application & Infrastructure Vulnerability Management More Effective
sponsored by ZeroNorth
WHITE PAPER: Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

ZeroNorth

Do You Need a WAF, or Something Better than a WAF?
sponsored by Shape Security
RESOURCE: The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.
Posted: 27 Aug 2019 | Published: 01 May 2019

Shape Security

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Defend Yourself with Risk-Based Vulnerability Management
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.
Posted: 08 Aug 2019 | Premiered: Aug 8, 2019

Arctic Wolf Networks, Inc.

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

Malware: The Ubiquitous Menace
sponsored by The Media Trust
WHITE PAPER: Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

The Media Trust

The Four Pillars of Modern Vulnerability Management
sponsored by Rapid7
WHITE PAPER: In this white paper, discover a comprehensive approach to reducing vulnerabilities across your ecosystem.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Rapid7

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 21 Jun 2019 | Published: 31 Jan 2019

Proofpoint

Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY: Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019


Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

The Total Economic Impact™ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Missing Cyberhygiene: Ransomware – Curse and Cure
sponsored by Open Systems
WHITE PAPER: Almost all security experts today would agree that proper internet hygiene is a key element in protecting our IT infrastructure. Yet, malware seems to have been infecting our computers at epic rates for many years. In this white paper, discover how you can combat ransomware using vulnerability management today.
Posted: 08 May 2019 | Published: 08 May 2019


Malicious Cryptominers are Eyeing Your Resources.
sponsored by Cisco Umbrella
EBOOK: Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY: Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Prepare for Battle: Building an Incident Response Plan
sponsored by Rapid7
EBOOK: Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. Creating and testing an incident response (IR) plan gives you that foundation. In this e-book, explore 4 steps to building and testing a successful IR plan.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Rapid7
26 - 50 of 238 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info