IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed   
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
51 - 75 of 517 Matches Previous Page  |  Next Page
Complexity in Cybersecurity Report
sponsored by IBM
ANALYST REPORT: Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.
Posted: 07 Aug 2020 | Published: 31 May 2019

IBM

Securing OT Systems in the Face of Rapid Threat Evolution
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and IT used exist independent of one another, and each had their own security. But with the evolution of IoT, OT is beginning to merge with IT and connect to the internet, exposing OT to an increased number of security risks. Read this white paper on what CISOs need to know about the advanced threat landscape.
Posted: 06 Aug 2020 | Published: 15 Feb 2020

Fortinet, Inc.

BlackBerry MITRE ATTACK APT29 Evaluation
sponsored by BlackBerry
WHITE PAPER: In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

BlackBerry

SIG - Farm Credit Customer Story
sponsored by Cisco Umbrella
CASE STUDY: Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SonicWall

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Lockdown Lessons: Closing Security Gaps
sponsored by Webroot
WHITE PAPER: It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Types of Phishing Attacks You Need to Know to Stay Safe
sponsored by Webroot
WHITE PAPER: Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

2020 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT: In 2019, 93.6% of malware detected was only seen on a single PC. This is significant because it shows that it only takes one mistake from one employee to compromise a network. Organizations are looking for ways to defend against threats, but to do so, they must first know their enemy. Read this threat report to see the statistics of cybersecurity.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

Lockdown Lessons: Shoring up Your Network and Security Policies
sponsored by Webroot
RESOURCE: Organizations have been required to create a sense of urgency around the review and possible rebuild of their network security. Indefinite remote work has placed architects in a fire storm, and without the proper defense and policy, your network could be in trouble. Read these 3 lockdown lessons to learn more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Webroot

The Definitive Guide to Data Protection
sponsored by Forcepoint
RESOURCE: It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

MITRE ATT&CK: Security Evaluation Overview
sponsored by BlackBerry
VIDEO: MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

BlackBerry

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™
sponsored by Guardicore
ANALYST REPORT: With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.
Posted: 22 Jul 2020 | Published: 30 Jun 2020

Guardicore

Protecting Workloads and Hybrid in Multi-Cloud Environments
sponsored by Guardicore
WHITE PAPER: Businesses may be moving to the cloud, but with 98% of enterprises running on-premise servers, data centers aren’t going anywhere. A hybrid cloud model uses both on-prem data centers and a public cloud to optimize functionality. Read this white paper for information on how to keep these dual-workloads secure.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Guardicore

MITRE ATT&CK: The Power of Prevention
sponsored by BlackBerry
VIDEO: In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

Panelist Discussion with Q&A
sponsored by BlackBerry
VIDEO: In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

BlackBerry

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Unpacking Research on Employee Security Awareness
sponsored by Mimecast
WEBCAST: The numbers are in: Information alone does not change people’s minds. Organizations will attempt to mold their employees into security encyclopedias, but without proper behavioral analysis, no amount of training will do what is desired.Immerse yourself in this webcast, which unpacks Forrester research and gets to the bottom of security awareness.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Mimecast

The 2020 Hacker Report
sponsored by HackerOne
ANALYST REPORT: The word ‘hacker’ usually brings about an image of a person in a dark room in an undisclosed location trying to uncover secrets or bring down those in power (or both).The truth? Hackers are vital to the infrastructural health of organizations; the world just doesn’t know it yet.Glance at this report to learn more about the global impact of hackers.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Lessons in Threat Detection
sponsored by Orange Business Services
WHITE PAPER: The UK’s 2018 Cyber Security Breaches Survey found that 43% of businesses had experienced a cybersecurity breach in the last 12 months.With threats on the horizon, some businesses have decided that the best way to learn about their security is to hack… themselves?Jump into this white paper to see what one organization learned from doing so.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Combating the Threat of Business Email Compromise
sponsored by Mimecast
WHITE PAPER: According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

The State of Email Security 2020
sponsored by Mimecast
RESOURCE: It is impossible to control who is threatening your business and why, but it is possible to know how to better defend from threats by becoming more knowledgeable about how other organizations are handling them. Find out which trends are most relevant to you. Dive into this infographic for data on threat resilience and cybersecurity preparedness.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Mimecast
51 - 75 of 517 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info