IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 487 Matches Previous Page  |  Next Page
Common and Best Practices for SOCs: Results from the 2019 Survey
sponsored by Siemplify
WHITE PAPER: In the 2019 edition of the Security Operations Center (SOC) Survey, security leaders & professionals provided responses in order to better understand:Common barriers & best practicesWhere to focus to enhance security What to highlight when requesting additional SOC resourcesDownload the report to uncover the key results.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

Microsoft Vulnerabilities Report 2019
sponsored by BeyondTrust Corporation
WHITE PAPER: The 2019 Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from 2018, analyzes the trends, and includes viewpoints from security experts. Read on to get started.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

BeyondTrust Corporation

State and Local Governments Chart Their Path Toward Improved Digital Security
sponsored by Dell Technologies
RESOURCE: State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities
sponsored by Fidelis
ANALYST REPORT: When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.
Posted: 05 Nov 2019 | Published: 30 Sep 2019

Fidelis

Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception
sponsored by Fidelis
WHITE PAPER: As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.
Posted: 01 Nov 2019 | Published: 30 Sep 2019

Fidelis

Improving Cybersecurity with ITAM: An Equifax Case Study
sponsored by Snow Software
WEBCAST: Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.
Posted: 31 Oct 2019 | Premiered: Oct 31, 2019

Snow Software

6 Security Checkpoints to Consider Along Your Organization’s Cloud Journey
sponsored by CyberArk Software, Inc
RESOURCE: Whether you’re on a journey to a public, private or hybrid cloud environment, relying on DevOps or leveraging SaaS applications, understanding cloud computing vulnerabilities is critical. In this infographic, discover 6 cloud vulnerabilities and steps for securing them.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

CyberArk Software, Inc

Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 31 Aug 2019

IBM

Ponemon Institute Report: Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 31 Aug 2019

IBM

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 24 Oct 2019 | Published: 22 Oct 2019

ServiceNow

IT and Security Working Better Together
sponsored by ServiceNow
RESOURCE: With cyber exposure gaps continuing to increase, organizations need to up their vulnerability management strategy to resolve the most critical vulnerability first, reducing the risk window and potential exposure. Dive into this brief to learn how Optiv, ServiceNow, and Tenable are working together.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Evaluating Vulnerability Risk Management Providers
sponsored by Rapid7
ANALYST REPORT: As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.
Posted: 22 Oct 2019 | Published: 17 Oct 2019

Rapid7

Automation Is a Security Pro’s Best Friend
sponsored by FireMon
RESOURCE: The benefits of automation are universal no matter your industry. In this infographic, learn 7 reasons why automation is a security pro’s best friend including its ability to remove the manual tasks that often result in human error.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

FireMon

Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

ComputerWeekly.com

Attack Surface Visibility and Reducing Risk with HackerOne: Verizon Media Webinar
sponsored by HackerOne
WEBCAST: Verizon Media is the media giant that owns a slew of dynamic brands including Yahoo, AOL, Tumblr, that over 1 billion people love and trust. Cybersecurity is paramount in maintaining that trust. In this webinar, learn how their security team worked with HackerOne to run a robust bug bounty program aimed at reducing the risk of a security incident.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

HackerOne

What Really Happened with the Capital One Attack and How to Prevent it
sponsored by Aporeto
WEBCAST: The Capital One data breach on July 30, 2019 was due to the exploitation of a well-known class of security vulnerabilities that are based on security relying on credentials. In this video, listen as Aporeto CTO, Dimitri Stiliadis discusses the root cause and how to prevent a breach with Aporeto.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

Aporeto

Critical Watch Report: 2019
sponsored by Alert Logic
ANALYST REPORT: SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Alert Logic

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset
sponsored by IBM
WHITE PAPER: The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

IBM

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Evaluating a Penetration Testing Company
sponsored by InteliSecure
WHITE PAPER: Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

InteliSecure

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com
1 - 25 of 487 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement