IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 460 Matches Previous Page  |  Next Page
CyberArk PAS Assessment Tool
sponsored by CyberArk Software, Inc
PRODUCT OVERVIEW: The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

CyberArk Software, Inc

Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY: Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY: Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

The Total Economic Impact Of Alert Logic SIEMless Threat Management
sponsored by Alert Logic
RESEARCH CONTENT: Many companies struggle to assemble the right combination of tools and expertise to provide their own security and secure their clients' applications and data in public cloud and hybrid environments. In this Forrester Consulting TEI study, evaluate Alert Logic's ability to help companies solve these problems.
Posted: 14 Jun 2019 | Published: 31 May 2019

Alert Logic

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

What Complying With Kari's Law Means For Your Business
sponsored by Bandwidth
WHITE PAPER: Kari's Law requires direct dialing of "9-1-1" for emergency services to be enabled in enterprise environments and directs the FCC to develop necessary calling regulations for the multi-line telephone systems. In this white paper, learn how to bring your business into compliance with the law before the February 2020 deadline.
Posted: 12 Jun 2019 | Published: 18 Mar 2019

Bandwidth

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

2019 SonicWall Cyberthreat Report
sponsored by SonicWall
RESEARCH CONTENT: Even for organizations, businesses and governments, a cyberattack is personal. At its very core, they strip these establishments and employees of their identities, privacy, reputation and monetary assets. In SonicWall's 2019 SonicWall Cyber Threat Report, explore key advancements in the threat landscape.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

SonicWall

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Swinburne University of Technology Meets Its Essential 8 Mandate
sponsored by Ivanti ANZ
CASE STUDY: Following a risk assessment, Swinburne University determined that following the ASD Essential 8 recommended cybersecurity mitigation strategies would help ensure the strongest form of defense against a cyberattack. In this case study, learn how Swinburne was able to implement the ASD Essential 8 by implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

ServiceNow Security Operations Infographic
sponsored by ServiceNow
RESOURCE: Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.
Posted: 29 May 2019 | Published: 29 May 2019

ServiceNow

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019


What is an Ounce of Cybersecurity Prevention Worth?
sponsored by Verizon
RESOURCE: Data breaches and their costs are a major risk to your business. But they are a risk that can be mitigated. Understanding theft tactics based on the experiences of others is critically important. In this resource, explore tactics to help prevent data breaches and security holes in your organization.
Posted: 23 May 2019 | Published: 11 Feb 2019

Verizon

Core Principles of Cyber Hygiene in a World of Cloud and Mobility
sponsored by VMware and Intel
WHITE PAPER: No one wants to be the target of cybercriminals, but are you doing enough to protect your business? Many factors lead to security breaches, but there are 5 core principles that can help ensure you won't be the next victim featured on the nightly news. Download the whitepaper to learn how to address vulnerabilities before they become disastrous.
Posted: 23 May 2019 | Published: 30 Sep 2018

VMware and Intel

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell EMC
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell EMC
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 14 May 2019 | Published: 14 May 2019

Dell EMC

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

Open Source Network Security Tools for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

The Total Economic Impact™ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense
sponsored by NetScout Systems, Inc.
WHITE PAPER: The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.
1 - 25 of 460 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement