IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 519 Matches Previous Page  |  Next Page
EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

Product Video: Page Integrity Manager
sponsored by Akamai Technologies
VIDEO: Did you know that third-party scripts running on your website can make up more than half the code in your digital ecosystem? Those scripts are often outside your control, leaving you vulnerable at the browser-level. Watch this product demo and learn about a powerful, easy to implement, behavior-based approach to script attacks.
Posted: 13 Aug 2020 | Premiered: 13 Aug 2020

Akamai Technologies

DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?
sponsored by Akamai Technologies
RESOURCE: Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Akamai Technologies

Cloud Insiders - Risk and Compliance in the Hybrid Cloud
sponsored by Xtravirt
WEBCAST: A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Xtravirt

2020 SIEM Vendor Comparison Report
sponsored by IBM
ANALYST REPORT: Gartner named IBM a Leader in the latest Gartner Magic Quadrant for Security Information and Event Management (SIEM). In the report, Gartner placed IBM furthest to the right for "Completeness of Vision."
Posted: 07 Aug 2020 | Published: 18 Feb 2020

IBM

Effectively Addressing Advanced Threats Survey
sponsored by IBM
ANALYST REPORT: Keeping up with these threats can be daunting—until we consider what it takes to defend against them. Not all threats are created equal—however, not all defenses are created equal either. This survey from SANS Institute, in partnership with IBM, uncovers how large, mature organizations deal with advanced threats.
Posted: 07 Aug 2020 | Published: 31 Jul 2019

IBM

Complexity in Cybersecurity Report
sponsored by IBM
ANALYST REPORT: Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.
Posted: 07 Aug 2020 | Published: 31 May 2019

IBM

Building Robust Endpoint Defenses with Limited Resources
sponsored by Kaspersky Lab
WHITE PAPER: 91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

EDR: The Case for Automation and Simplification
sponsored by Kaspersky Lab
WHITE PAPER: Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this NGFW white paper so that you may approach your CISO with a well-informed recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

Securing OT Systems in the Face of Rapid Threat Evolution
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and IT used exist independent of one another, and each had their own security. But with the evolution of IoT, OT is beginning to merge with IT and connect to the internet, exposing OT to an increased number of security risks. Read this white paper on what CISOs need to know about the advanced threat landscape.
Posted: 06 Aug 2020 | Published: 15 Feb 2020

Fortinet, Inc.

SecOps Cybersecurity Best Practice Guide
sponsored by Covestic
RESOURCE: Cybersecurity incidents impact your bottom line. If you need evidence, Equifax’s breach cost them an estimated $4 billion in revenue. On a smaller scale, legal fees of cybersecurity litigation can cost about $2.5 million. The next step in your security journey may cost less than you think. Open this guide for 5 cybersecurity best practices.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Covestic

Credential Stuffing Attacks Threaten Businesses in Asia-Pacific
sponsored by Akamai Technologies
RESOURCE: The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Akamai Technologies

Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

SIG - Farm Credit Customer Story
sponsored by Cisco Umbrella
CASE STUDY: Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SonicWall

Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific
sponsored by Akamai Technologies
WEBCAST: Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.
Posted: 30 Jul 2020 | Premiered: Jul 30, 2020

Akamai Technologies

Cyberthreat Hunting Guide
sponsored by Bitdefender
RESOURCE: Threat hunting is the proactive search for cyber threats within a network, including those that have already slipped past endpoint security defenses. In today’s security zeitgeist, it is more commonplace to use AI and machine learning to hunt threats as it can keep networks ahead of the curve. Read this guide to learn more.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Bitdefender

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Lockdown Lessons: Closing Security Gaps
sponsored by Webroot
WHITE PAPER: It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Now We’re All Working from Home, We Need to Become More Cybersecurity Aware
sponsored by Kaspersky Lab
RESOURCE: Remote access, passwords, security awareness, cybersecurity, cyber-awareness, endpoint security: All are keywords and phrases that you need to prioritize if you haven’t already. They should be top-of-mind alongside trust, device management and patching. Browse this article for literature on the required increase in security and security awareness.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Kaspersky Lab

Video: Decoding Magecart/Web Skimming Attacks
sponsored by Akamai Technologies
WEBCAST: Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

Akamai Technologies

Overcome Alert Fatigue with Actionable Threat Intelligence
sponsored by Bitdefender
WEBCAST: Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.
Posted: 28 Jul 2020 | Premiered: Jul 28, 2020

Bitdefender
1 - 25 of 519 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info