IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 617 Matches Previous Page  |  Next Page
All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

Vulnerability and Threat Trends Report 2018
sponsored by Skybox Security
RESEARCH CONTENT: This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Skybox Security

Protect Against Zero Day Threats and Malware
sponsored by Citrix
VIDEO: Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing.
Posted: 19 Feb 2018 | Premiered: 12 Feb 2018

Citrix

Employee & Device Monitoring: Dispelling the Myths
sponsored by Forcepoint
VIDEO: Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Forcepoint

6 Steps to Build a Holistic Security Strategy with Microsoft 365
sponsored by Microsoft
EBOOK: This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.
Posted: 14 Feb 2018 | Published: 30 Nov 2017

Microsoft

System Risk Identification
sponsored by NSS Labs
RESOURCE: Organization attack surfaces are large and complex, making it impossible to protect against everything all of the time. This resource offers strategies for assessing the impact of unmitigated risks and how to focus on the real attack surface.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

NSS Labs

Reducing Cybersecurity Costs & Risk through Automation
sponsored by Juniper Networks
RESEARCH CONTENT: Tap into a Ponemon Institute study to see how organizations can save an average of $2.3 million annually by moving to cyber automation.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Stop Targeted Attacks Before they Stop your Business
sponsored by Illusive Networks
RESOURCE: Access this resource to learn about Illusive's Deception Management System, a security tool where deceptions are perpetually designed, turned and tailored using AI so they appear—and remain—authentic to attackers.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Illusive Networks

Breach Prevention: The New Way Forward
sponsored by NSS Labs
WHITE PAPER: Attackers are able to bypass traditional endpoint and perimeter-based security solutions. This white paper explains why organizations are adopting breach detection systems (BDS) to evolve with the ever-changing threat landscape.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

NSS Labs

It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

Automate Firewall Change Management
sponsored by Skybox Security
WHITE PAPER: This white paper examines the current challenges in managing firewall changes, the typical firewall change management cycle and the concepts of an automate workflow system that addresses these challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

The Path to GDPR Compliance
sponsored by Digital Shadows
WHITE PAPER: In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Digital Shadows

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Painless DevSecOps Integration across the Value Stream
sponsored by Tasktop
WEBCAST: This webcast explores how to take a DevSecOps approach to minimizing the impact of vulnerabilities on your apps. Find out how to make developers, QAers, and security pros aware of vulnerabilities as soon as possible and discover how you can integrate tools end-to-end across the value stream.
Posted: 06 Feb 2018 | Premiered: Feb 6, 2018

Tasktop

Cryptocurrencies are the New Frontier of Fraud
sponsored by Digital Shadows
WHITE PAPER: In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Digital Shadows

Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Tomorrow's Security is Here
sponsored by Skybox Security
RESOURCE: Oftentimes, security leaders struggle to gain visibility over attack surfaces and manage its complexity. This resource offers insight into improving the efficiency and performance of security operations.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Skybox Security

Enabling and Securing Digital Transformation
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn the specific challenges facing your organizations security capabilities and what's at stake. Then, evaluate how a comprehensive identity and access management system can help you minimize the threats to your environments.
Posted: 02 Feb 2018 | Published: 31 Dec 2016

CA Technologies

Shedding Light on the Cloud App Visibility Blind Spot
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how the risk posed by shadow IT has grown, as well as why traditional controls and security policies don't address account-centric threats. Then explore 3 criteria organizations should consider to address the visibility blind spots between themselves and their cloud providers.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Forcepoint

The SIEM Buyer's Guide
sponsored by Splunk
RESOURCE: How have SIEM platforms evolved? This SIEM Buyer's Guide reveals the differences between modern SIEM and legacy SIEM and offers 9 technical capabilities of a modern SIEM strategy and how it can improve your overall security.
Posted: 31 Jan 2018 | Published: 31 Jan 2018

Splunk

New Topics on the New Security+ SYO-501 Exam
sponsored by Global Knowledge
RESOURCE: It has been 3 years since the last revision of the CompTIA Security+ exam. In this resource, industry expert James Michael Stewart explains the updates to the exam and everything you need to know to prepare.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Global Knowledge

Sharing Threat Intelligence to Curb Targeted Attacks
sponsored by ServiceNow
RESOURCE: In this resource, learn how a Trusted Security Circle allows security teams to anonymously share observable data with industry peers, members of their supply chain or a global circle.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

ServiceNow
1 - 25 of 617 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement