IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 651 Matches Previous Page  |  Next Page
2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

Implement a Risk-Based Approach to Vulnerability Management
sponsored by Skybox Security
ANALYST REPORT: According to Gartner, by 2022, approximately 30% of enterprises will adopt a risk-based approach to vulnerability management. Learn how you can become a part of this statistic and improve your vulnerability management program's effectiveness, today.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Skybox Security

How You Can Use the Dark Web for Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: Deciphering the terminology around what the dark web is or isn't can be confusing. Learn how to better understand the dark web, the potential benefits of information gathered from these anonymous communities, and how it can be used to produce valuable threat intelligence.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Recorded Future

Busting Threat Intelligence Myths: A Guide for Security Pros
sponsored by Recorded Future
WHITE PAPER: There are many misconceptions about what threat intelligence is, leading many security pros to believe that threat intelligence doesn't have an advantage to bring into their particular role. Explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Security of Mobile Banking
sponsored by MobileIron
WHITE PAPER: Mobile devices now constitute the majority of web traffic globally, and consumers are embracing mobile banking in record numbers. Read on to find out how banks can overcome the barriers to mobile banking security and respond with secure mobile banking applications.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

The State of Vulnerability Response in Financial Services: Patch Work Demands Attention
sponsored by ServiceNow
WHITE PAPER: Download this report for a look at what 467 cybersecurity professionals in the financial services industry have to say about data breaches and how your organization could benefit from end-to-end vulnerability patching.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ServiceNow

Black Hat 2018 Hacker Survey Report
sponsored by Thycotic
RESEARCH CONTENT: Discover the hacker perspective on vulnerabilities and attack vectors they find easiest to exploit and better understand how to protect your organization.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

Thycotic

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: Read through this creative security storybook and discover the many anxieties that can plague you and other security professionals. If you share some of these feelings, you may want to consider a new security tool.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Vulnerability Review 2018: Top Desktop Apps
sponsored by Flexera Software
RESEARCH CONTENT: Download this 2018 report for key figures and facts on vulnerabilities affecting the most common desktop applications.
Posted: 06 Sep 2018 | Published: 30 Jun 2018

Flexera Software

Vulnerability Review 2018: Global Trends
sponsored by Flexera Software
RESEARCH CONTENT: Download this report for key figures and facts on vulnerabilities from a global information security perspective.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Flexera Software

Securing Growth Through M&A: Using Deception to Protect Dynamic Business Infrastructure
sponsored by Illusive Networks
RESOURCE: Take a look at this resource about cyber risk use cases for deception technology and learn from the example of how security was compromised when Verizon Communications acquired Yahoo! Inc's Internet properties.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Illusive Networks

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal
sponsored by Tenable
WHITE PAPER: Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale
Posted: 20 Aug 2018 | Published: 08 Aug 2018

Tenable

Quantifying the Attacker's First-Mover Advantage
sponsored by Tenable
RESEARCH CONTENT: Learn more in this research report, as Tenable Research examines the 50 most prevalent vulnerabilities in an analysis of a real-world vulnerability assessment. Read on to find out how you can quantify your attacker's first-mover advantage through vulnerability scans.
Posted: 10 Aug 2018 | Published: 16 May 2018

Tenable

Solving the Cybersecurity Skills Shortage
sponsored by Arctic Wolf
WEBCAST: 22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
Posted: 10 Aug 2018 | Premiered: Aug 10, 2018

Arctic Wolf

2018: Cyberthreat Predictions & Security Strategy
sponsored by Aruba Networks
VIDEO: With major breaches exposing a vast amount of personal information and disruptive ransomware attacks shaking the world, it is critical to examine the lessons learn from these events to shape a strategy. In this webinar, listen to a panel of security experts as they discuss.
Posted: 10 Aug 2018 | Premiered: 02 Aug 2018

Aruba Networks

Guide to Modernizing Traditional Security: The Advantages of Moving a Legacy Application to Containers
sponsored by Twistlock, Inc.
RESOURCE: The trend of "lift and shift" has started to take off with moving applications to containerized environments. Read on to find out the advantages of taking a containerized approach with compliance, vulnerability management, and runtime defense.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Vulnerability and Threat Trends: 2018 Mid-year Update
sponsored by Skybox Security
WHITE PAPER: Keeping up with the latest threat intelligence can help you better align your 2H 2018 security strategy. Download this research report to examine trends in vulnerabilities, exploits and threats, and much more.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

How Visibility of the Attack Surface Minimizes Risk
sponsored by Skybox Security
RESOURCE: Attackers are being stealthy when they steal data, often targeting areas where visibility lacks. In this SANS resource discover the importance of visibility for minimizing security risk and enhancing security management.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


Cyber Exposure for Dummies
sponsored by Tenable
EBOOK: Access this in-depth explanation of the features and benefits of a cyber exposure platform and discover how to evolve your existing security program to address new risks in this 77-page Cyber Exposure for Dummies e-book.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Tenable

Vulnerability Management: A Feature Report
sponsored by Sysdig
PRODUCT OVERVIEW: DevSecOps helps application teams deliver secure and reliable services faster. Learn how Sysdig Secure's vulnerability management capabilities integrate with ALM tools to bring application security, compliance, and quality closer to the developer.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Sysdig

Day in the Life of an IT Manager: Managing Security Risks
sponsored by Oracle Corporation
VIDEO: Check out this day in the life video to see how IT managers are responding to CVE alerts and subsequent patching demands with just a few clicks of a mouse.
Posted: 09 Aug 2018 | Premiered: 09 Aug 2018

Oracle Corporation

The Evolution to Threat-Centric Security
sponsored by Rackspace Microsoft
RESOURCE: In this blog, learn why your organization should perform cost and risk analysis to determine whether to attempt in-house security or hire outside experts. In this blog, learn why your organization should perform cost and risk analysis to determine whether to attempt in-house security or hire outside experts.
Posted: 07 Aug 2018 | Published: 24 Jan 2017

Rackspace Microsoft

Report: Financial Services Threat Landscape
sponsored by IntSights
WHITE PAPER: Prepare your organization for the future of cyberthreats. This white paper covers 5 cybersecurity predictions for 2019, global trends in cybersecurity, and much more.
Posted: 07 Aug 2018 | Published: 31 Jul 2018

IntSights

How to Reduce Your Organization's Digital Attack Surface & Cyber Risk
sponsored by IntSights
ANALYST REPORT: Download this Forrester Research report to discover best practices and the best DRP tools to keep your organization protected.
Posted: 07 Aug 2018 | Published: 30 Jun 2018

IntSights
1 - 25 of 651 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement