IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 455 Matches Previous Page  |  Next Page
Avert Cyber Attacks with Proactive Endpoint Hardening
sponsored by Automox
WHITE PAPER: The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


How Do Vulnerabilities Get into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

State of Software Security: Executive Summary
sponsored by Veracode, Inc.
RESEARCH CONTENT: The 2019 Veracode State of Software Security represents the 10th version of the report. Gain insight into the high-level application security trends Veracode identified this year in this executive summary of their report.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Veracode, Inc.

Testing the Depths of Your Security
sponsored by Trustwave
RESOURCE: Proactive security testing can help you understand where your risks and vulnerabilities reside. Download this infographic for insights on how to follow the best practices in security testing.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Trustwave

Securing Financial Data from Within
sponsored by Trustwave
CASE STUDY: In this case study, discover how a global accounting firm was able equip their IT staff with a point-and-shoot security program that enabled them to audit user access, address misconfigurations and other vulnerabilities. Read on to see the full story.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Trustwave

What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

Lessons from the Field: How are Skilled Testers Infiltrating?
sponsored by Dell SecureWorks
WEBCAST: In this webcast, hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.
Posted: 09 Mar 2020 | Premiered: Mar 9, 2020

Dell SecureWorks

Analyst Connection: Vulnerability Management is Much More than Assessment Scanning
sponsored by ServiceNow
ANALYST REPORT: There are 2 major misconceptions about vulnerability management. Learn what they are (and much more) in this Q&A with IDC Research Director Chris Kissel.
Posted: 06 Mar 2020 | Published: 29 Feb 2020

ServiceNow

For Dummies: Digital Transformation and Risk, ServiceNow Special Edition
sponsored by ServiceNow
EBOOK: In this For Dummies e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

ServiceNow

The Pressing Need for Comprehensive Cyber Risk Management
sponsored by ServiceNow
ANALYST REPORT: There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.
Posted: 06 Mar 2020 | Published: 31 Dec 2019

ServiceNow

10 Cybersecurity Steps You Can Start on Today
sponsored by Crosskey Cyber Security
RESOURCE: As a business leader in a small or medium sized high-risk business, you are overwhelmed by many things. And threats and regulatory requirements keep multiplying. In this blog post, explore a list of 10 cybersecurity steps you can start on today.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

Crosskey Cyber Security

Evaluating Vendor Risk Management
sponsored by Atlassian
WHITE PAPER: As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Atlassian

How to Keep API Secure from Bot Cyberattacks
sponsored by Radware
WHITE PAPER: Application programming interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. Despite their rapid and widespread deployment, APIs remain poorly protected and can leave business-critical services are at risk due to bot attacks. Learn how you can stay protected in this white paper.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

Insider Threat and Supply Chain Risk Reduction – in Real-Time
sponsored by Ionic Security
RESOURCE: Today’s organizations face a vast array of security threats, the 2 most prevalent being insider breaches and third-party attacks. In this blog post, the VP of Risk & Corporate Security at Ionic shares his guidance on how to best identify and mitigate these threats.
Posted: 25 Feb 2020 | Published: 03 Jan 2020

Ionic Security

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

Euromonitor
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.
Posted: 18 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Core - DNS - What attacks aren't you seeing?
sponsored by Cisco Umbrella
EBOOK: Networks are growing increasingly dispersed and hackers are adapting their attack methods to expose gaps amongst endpoints. In this e-book, discover how a complete network visibility strategy can help to identify risks and block potential threats before they have a chance to strike.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Enhancing Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Learn how ServiceNow can help your organization achieve faster vulnerability response rates, improve operational transparency, and create a more digitally secure working environment for all.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

ServiceNow

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation

Continuous Risk Monitoring for Vulnerabilities
sponsored by ServiceNow
PRODUCT DEMO: In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.
Posted: 05 Feb 2020 | Premiered: 04 Dec 2019

ServiceNow

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Managed Vulnerability Assessment
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

Cyber Risk Spotlight Report: 11 Metrics to Watch
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to Gartner, it takes hackers on average fewer than 8 days to exploit a vulnerability. In this report, dive into the key metrics every security team needs to better secure their operations and help prevent cyberattacks.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Arctic Wolf Networks, Inc.
1 - 25 of 455 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info