IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 533 Matches Previous Page  |  Next Page
Risk Management Best Practices for Privileged Access Management (PAM)
sponsored by Quest
WHITE PAPER: Applying risk management best practices to privileged access management (PAM) can provide a solid framework for threat awareness, and it can help organizations organically meet the rising number of compliance requirements. Read this white paper to learn 8 best practices for applying risk management to PAM.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Quest

Hacking Active Directory – From A Pen Tester
sponsored by Quest
WHITE PAPER: Active Directories (AD) provides authentication and protects credentials, information systems and intellectual property from unauthorized access – protecting your organization from financial and reputational harm. However, cybercriminals have found ways to exploit ADs – read this white paper to see the 8 most common AD-specific threats.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

McAfee MVISION Insights
sponsored by McAfee
DATA SHEET: Enterprises have reacted to the evolution of cyberthreats by increasing security budgets and adopting siloed threat intelligence platforms, but neither of these strategies has offered the desired results. They both require rigorous human intervention and produce only limited actionability. Read this white paper for an alternative approach.
Posted: 21 Oct 2020 | Published: 31 Jul 2020

McAfee

Tackling Cyber Threats in a Newly Distributed Workforce
sponsored by IntelliGO
WHITE PAPER: As organizations scramble to deal with the logistical kinks that come from hastily enabling a newly remote workforce, their IT teams must remain vigilant and flexible when it comes to securing tech assets amid changing circumstances. How can you make sure you’re staying on top of threats? Read this white paper to learn where to start.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

IntelliGO

Automated Assurance is Key to the Automation of 5G and SD-WAN Operations
sponsored by Spirent
WHITE PAPER: 5G and SD-WAN are significant emerging technologies hitting the market. However, as operations automation becomes more pervasive, these technologies will need to be rigorously checked for vulnerabilities. Luckily, automation can help. Read this white paper to understand automated assurance.
Posted: 15 Oct 2020 | Published: 31 Mar 2019

Spirent

Virtual Patching: Eliminate the Risk by Eliminating the Time Gap
sponsored by Panda Security
WHITE PAPER: This e-book explores many elements of modern vulnerability management, with a special focus on virtual patching, and why a combination of traditional and virtual patching might be the answer to many of the challenges that this area of endpoint security poses.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Panda Security

Best Practices for Special-Purpose System Security
sponsored by ColorTokens
RESOURCE: A special-purpose system is an endpoint with a specific function, such as an airport kiosk or an ATM. And while these endpoints facilitate convenience, they also present significant security challenges. Read this article to learn more about where the vulnerabilities lie and how to address them.
Posted: 06 Oct 2020 | Published: 15 Aug 2020

ColorTokens

Cybersecurity Risk Management Simplified
sponsored by CyberSaint
DATA SHEET: There could be no greater luxury in today’s unpredictable world than having cybersecurity and risk management simplified. In this white paper, you can learn about a standardized risk management platform that allows you to integrate your strategy for a unified approach, manage expectations for risk reduction, and intelligently present cost.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

CyberSaint

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Close the Gap In Device Security
sponsored by HP Inc
WHITE PAPER: Today, endpoints are a key target for threat actors, and a shortage in talent isn’t helping. Security professionals have figured out that innovation is necessary for endpoint security, so where can you start? Read this white paper to learn RFP requirements and protect your organization.
Posted: 15 Sep 2020 | Published: 28 Jun 2019

HP Inc

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Trend Micro Vulnerability Protection Overview
sponsored by Trend Micro
WHITE PAPER: This document outlines the process behind IDS/IPS rule creation and answers common questions about vulnerability coverage and security controls across Trend Micro’s various offerings. Read on to learn more about rule creation, quality assurance testing, hybrid cloud workload security, and more.
Posted: 11 Sep 2020 | Published: 30 Jun 2020

Trend Micro

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis
sponsored by Comcast Business
DATA SHEET: Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Comcast Business

Apex One Datasheet
sponsored by Trend Micro
DATA SHEET: The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

Securing the Pandemic-Disrupted Workplace
sponsored by Trend Micro
ANALYST REPORT: COVID-19 has granted threat actors the permission to get their hands as dirty as possible. A spike in remote work has given them a larger attack surface than ever, and although the number of new cases is decreasing, these attacks show no signs of going away. To get the numbers behind the danger, jump into this in-depth report.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

The Buyer's Guide To Penetration Testing
sponsored by Synack
WHITE PAPER: From scanners and traditional pen tests to bug bounty programs, and platform-based security tests – there's a lot of jargon and variation out there. Cut through the confusion and choose what's best for you. Download the Buyer's Guide to Penetration Testing to learn more.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

Cyber Resilient Organization Report 2020
sponsored by IBM
ANALYST REPORT: The volume of cybersecurity incidents has risen, causing disruption to IT and business processes. In fact, 51% of organizations reported a significant business disruption during the past two years due to a cybersecurity incident. What did they report regarding cyber resiliency? How are they planning for the future? Read this report to find out.
Posted: 27 Aug 2020 | Published: 31 Jul 2020

IBM
1 - 25 of 533 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info