An Introduction to Ranking a Vulnerability’s Priority Based on its Unique Network Context
sponsored by Dell SecureWorks
WHITE PAPER:
In this white paper, learn all about Contextual Prioritization, which is ranking a vulnerability’s priority based on its unique network context.
Posted: 15 Apr 2021 | Published: 15 Apr 2021
|
|
|
How To Achieve Risk-Based Vulnerability Management
sponsored by AT&T Cybersecurity
WHITE PAPER:
Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021
|
|
|
Integrate Your Security And Asset Workflows To Remediate Threats Faster
sponsored by ServiceNow
DATA SHEET:
79% of companies that experienced a security breach indicate that it could have been avoided with a patch or configuration change. Have you ever considered that integrating your security and asset workflows could lead to faster threat remediation? Access this data sheet to learn a new way to manage vulnerability.
Posted: 26 Mar 2021 | Published: 20 Oct 2020
|
|
|
Secureworks: Insights from SolarWinds and the Next Steps for Cybersecurity
sponsored by Dell SecureWorks
WEBCAST:
The recent SolarWinds Orion software compromise gave the world a crash course in vulnerability. Leverage this webinar featuring incident response experts as they discuss the SolarWinds attacks and the lessons that can be drawn from them, including measures you can take to help keep your organization secure going forward.
Posted: 22 Mar 2021 | Premiered: Mar 22, 2021
|
|
|
Microsoft Vulnerabilities Report 2021
sponsored by BeyondTrust Corporation
EBOOK:
Unpatched vulnerabilities are the cause of 1 in 3 breaches around the world, costing organizations millions. The need to install the latest security patches to mitigate vulnerabilities is well-understood, but volume can be overwhelming. Access the Microsoft Vulnerabilities Report to learn how you can mitigate these vulnerabilities.
Posted: 18 Mar 2021 | Published: 18 Mar 2021
|
|
|
How to Show Business Benefit by Moving to Risk-Based Vulnerability Management
sponsored by Tenable
EBOOK:
Placeholder
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
Top 5 Reasons to Evolve to Vulnerability Based-Risk Management
sponsored by Tenable
EBOOK:
Placeholder
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
YOUR ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM: RISK-BASED VULNERABILITY MANAGEMENT
sponsored by Tenable
EBOOK:
Placeholder
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
YOUR LEGACY VM IS FAILING YOU— AND YOU MAY NOT EVEN KNOW IT
sponsored by Tenable
EBOOK:
In this eguide, read about the over 17,000 new vulnerabilities disclosed in the past year alone. Discover how your organization can focus on the risk that matters most to your organization.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
HOW SECURITY LEADERS WIN SUPPORT FOR RISK-BASED VULNERABILITY MANAGEMENT
sponsored by Tenable
EBOOK:
In thie eguide, read about Risk-Based Vulnerability Management. Read on about how your organization can put your risk-based VM strategy into action.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
REFERENCE ARCHITECTURE: RISK-BASED VULNERABILITY MANAGEMENT
sponsored by Tenable
EBOOK:
In this eguide, learn about Risk-Based Vulnerability management and how your organization can benefit from adopting these tools.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
CALCULATING KNOWN AND UNKNOWN RISK THE MATH BEHIND THE CYBER EXPOSURE SCORE
sponsored by Tenable
EBOOK:
In thie eguide, learn about how you can prioritize the protection of your assets using a Cyber Exposure Score.
Posted: 25 Feb 2021 | Published: 25 Feb 2021
|
|
|
Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET:
Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
|
|
|
The 2021 State Of Open Source Vulnerabilities
sponsored by Fossa
RESEARCH CONTENT:
Open source has become increasingly popular – but as its usage grows, so too do its vulnerabilities. This research report provides a comprehensive look into today’s open source vulnerability landscape, highlighting current trends, long-term developments and best practices – read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
|
|
|
The Total Economic Impact of ServiceNow Security Operations
sponsored by ServiceNow
ANALYST REPORT:
With the growing complexity and volume of cyberattacks, organizations will become more vulnerable to security threats. You need security orchestration tools that can connect security and IT teams for faster and more efficient response to security incidents. Access this Forrester report to get the facts on ServiceNow’s Security Operations.
Posted: 12 Feb 2021 | Published: 30 Oct 2020
|
|
|
Automated Pen Testing Vs Breach & Attack Simulation
sponsored by Cymulate
EGUIDE:
Attack simulation and penetration testing are popular methods for organizations to find and address potential weaknesses in their security programs – but deciding between pen testing and attack simulation can be tricky. Read this e-guide for helpful tips.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
|
|
|
How Cyberattack Simulations Differ From Penetration & Vulnerability Tests
sponsored by Cymulate
WHITE PAPER:
Targeted cyberattack simulation, vulnerability scans, penetration testing – which of these is the most effective method of identifying weaknesses within your defenses and ensuring your security capabilities can handle the rigors of today’s cyberthreats? Read this white paper to find out.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
|
|
|
Changing the Paradigm of Security Testing
sponsored by Cymulate
WEBCAST:
The threat landscape is dynamic – your security testing should be too. View this Forrester sponsored webinar to learn how a breach & attack simulation (BAS) platform can help get you there.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021
|
|
|
Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK:
Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
|
|
|
Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE:
Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020
|
|
|
The State of Application Security
sponsored by WhiteHat Security
WEBCAST:
Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020
|
|
|
Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST:
Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020
|
|
|
How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER:
Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020
|
|
|
Understanding & Preventing Ransomware Attacks
sponsored by Keeper Security Inc
WHITE PAPER:
Ransomware attacks are particularly devastating in that they can be done with little technical expertise – they can even be purchased as a cloud service! A new attack happens about every 14 seconds, and their global damages are expected to reach $20B by 2021. So how can you prevent them? Read this white paper to find out.
Posted: 12 Oct 2020 | Published: 12 Oct 2020
|
|
|
Virtual Patching: Eliminate the Risk by Eliminating the Time Gap
sponsored by Panda Security
WHITE PAPER:
This e-book explores many elements of modern vulnerability management, with a special focus on virtual patching, and why a combination of traditional and virtual patching might be the answer to many of the challenges that this area of endpoint security poses.
Posted: 07 Oct 2020 | Published: 07 Oct 2020
|
|