IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 443 Matches Previous Page  |  Next Page
Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Secure Print Services Are Key to Digital Transformation
sponsored by HP
RESOURCE: Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Two Ways To Reduce Third-Party Tag Security Risks
sponsored by Instart
RESOURCE: Today's websites rely on third-party tags. These tags are scripts developed by third-parties that you include on your website. There's one major problem: browsers provide limited abilities to control a third-party tag, which in turn exposes you to major security risks. In this article, learn what you can do to mitigate third-party tag exposure.
Posted: 12 Mar 2019 | Published: 14 Jan 2019

Instart

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

7 Common Security Pitfalls to Avoid When Migrating to The Cloud
sponsored by HackerOne
WHITE PAPER: The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

A Patch Made in Heaven
sponsored by Kaseya
WHITE PAPER: As breaches become more prevalent, IT professionals must accept patch management for what it is — a way to create a robust security layer with the routine and timely installation of patches. Time being the most critical element. In this white paper, learn about 3 critical components to any effective patch management strategy.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Kaseya

What is a Vulnerability Disclosure Policy and Why Do You Need One?
sponsored by HackerOne
WHITE PAPER: Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Effective Incident Response Planning Could Save You Millions
sponsored by Arctic Wolf
WHITE PAPER: As companies like Equifax, Verizon Wireless, and Anthem know all too well, it's not a matter of if, but when there will be a breach. Are you prepared to deal with an attack? In this white paper, learn how AWN CyberSOC for IR can help your organization swiftly detect and address your next (inevitable) data breach.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Arctic Wolf

Basics (and Beyond) of Patch Management
sponsored by ConnectWise
EBOOK: With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In this eBook, learn about the 6 step patch management process for reconciling the deployment state of an operating system and third party software updates.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

ConnectWise

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

How the Rapid Adoption of Public Clouds is Affecting Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Companies are increasingly moving data and applications to public cloud platforms. However, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. In this white paper, learn how public clouds demand particular attention from IT security managers for 3 reasons.
Posted: 28 Feb 2019 | Published: 28 Sep 2018

Fortinet, Inc.

Four Ways to Improve Endpoint Security
sponsored by Fortinet, Inc.
WHITE PAPER: Endpoint devices continue to be one of the favorite targets for cyberattacks. To address this vulnerability, security leaders must integrate endpoint security into their network security architecture. In this white paper, learn how a deep connection between endpoint and network security offers key improvements to holistic enterprise protection.
Posted: 26 Feb 2019 | Published: 27 Aug 2018

Fortinet, Inc.

Security 101: Defending Against Fileless Malware
sponsored by Trend Micro, Inc.
RESOURCE: Fileless malware aren't new, but they're an increasingly prevalent threat. They aren't as visible as traditional malware, employ a variety of techniques to stay persistent, and can adversely affect the integrity of the organization's business process. In this resource, take a closer look at how fileless threats work and how to prevent them.
Posted: 25 Feb 2019 | Published: 20 Dec 2018

Trend Micro, Inc.

Cybersecurity for Digital Twins
sponsored by Irdeto
EBOOK: There has been an increasing amount of interest in digital twins even though they have been around for decades. Twinning was traditionally used by companies to manage very large and complex assets. As with many new technology trends, security hasn't been front of mind. In this eBook, learn about all things digital twins.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Irdeto

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

Fortinet, Inc.

Cloud Based Asset Management
sponsored by Axonius
RESOURCE: When companies move to cloud instances like Amazon ECS/EKS/EC2, and Microsoft Azure, they are often faced with a compromise. They realize the reliability, flexibility, and cost savings of the cloud often sacrifice the security and visibility they have invested in for on-premise assets. In this infographic, learn how Axonius can help.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Axonius

Four Steps to Developing a World-Class Security Program
sponsored by Dell SecureWorks
WHITE PAPER: A reactive security approach is all too common, even though the question is not if a company will suffer an incident but when. By adopting a proactive stance, organizations minimize the likelihood of suffering a breach. In this white paper, discover 4 steps to developing a world-class security program.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Dell SecureWorks
1 - 25 of 443 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement