IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 466 Matches Previous Page  |  Next Page
Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

The 2020 Trust Report: eCommerce and Retail Executive Summary
sponsored by Synack
ANALYST REPORT: This 2020 Trust Report 1-Page Executive Summary allows you to quickly benchmark your organization’s security against others in eCommerce and Retail. You’ll also learn how organizations that adopt this one testing strategy harden their assets by 23%.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Synack

4 Steps to Prove the Value of Your Vulnerability Management Program
sponsored by AWS Rapid7
EBOOK: Security teams are famously understaffed, underfunded and underrecognized within their organizations – making it hard to secure funding for cybersecurity initiatives. Read this e-book and discover 4 ways your team can demonstrate the value of your vulnerability management program and attain executive buy-in.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

AWS Rapid7

Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

The State of Cloud Security 2020
sponsored by Sophos
ANALYST REPORT: Growing demand for both remote working and public cloud services has shifted on-premises infrastructure from asset to liability. But it’s no secret that moving to the cloud increases every organization’s attack surface. In this Sophos commissioned survey, learn some staggering statistics concerning cyberattacks and the vulnerability of the cloud.
Posted: 09 Dec 2020 | Published: 30 Oct 2020

Sophos

McAfee Labs Threat Report
sponsored by McAfee
WHITE PAPER: McAfee Laps has compiled the data collected from their MVISION Insights preview dashboard and constructed a report that shows some of the top security trends from the year 2020 regarding malware, robot vulnerabilities, phishing awareness and more. Access the full report to see trends from across the world.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

McAfee

How to Elevate Your Threat Intelligence Program
sponsored by DomainTools
WEBCAST: According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Finding the Disconnect: Security Perceptions and Behaviors of Today’s Enterprise Employees
sponsored by Dtex
EBOOK: As the modern enterprise acknowledges cyber risks as critical business risks, the nature of enterprise security discussions is quickly moving from the technical and operational to the strategic. This has created a new reality in which security decisions can turn a user into a trusted ally... or a liability. Read this guide to learn more.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

McAfee MVISION Insights
sponsored by McAfee
DATA SHEET: Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.
Posted: 21 Oct 2020 | Published: 31 Jul 2020

McAfee

Understanding & Preventing Ransomware Attacks
sponsored by Keeper Security Inc
WHITE PAPER: Ransomware attacks are particularly devastating in that they can be done with little technical expertise – they can even be purchased as a cloud service! A new attack happens about every 14 seconds, and their global damages are expected to reach $20B by 2021. So how can you prevent them? Read this white paper to find out.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Keeper Security Inc

Virtual Patching: Eliminate the Risk by Eliminating the Time Gap
sponsored by Panda Security
WHITE PAPER: This e-book explores many elements of modern vulnerability management, with a special focus on virtual patching, and why a combination of traditional and virtual patching might be the answer to many of the challenges that this area of endpoint security poses.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Panda Security

Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE: A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020

ColorTokens

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Managing the Modern Workforce: Your Guide to Choosing the Best WSUS Alternative
sponsored by Automox
RESOURCE: Windows Server Update Services (WSUS) has its advantages over patching, but there are many alternative patching platforms on the market today that are designed to meet the needs of the modern workplace. Access this guide to learn if you should consider a WSUS alternative for your organization.
Posted: 26 Aug 2020 | Published: 26 Aug 2020


Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet
1 - 25 of 466 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info