Vulnerability Assessments Research
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: TechTarget SecurityExpert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
-
SAAS Vulnerability Management: Choosing a Cloud-Based Service Provider
Sponsored by: TechTarget SecurityThis expert guide from SearchSecurity.com examines how to decide if SaaS vulnerability management is right for your organization and provides helpful tips for finding the right option for your environment.
-
Targeted attacks: Preparation and Mitigation
Sponsored by: TechTarget SecurityThis expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
Vulnerability Assessment
Sponsored by: Symantec CorporationAccess this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
The Use Case for Integrated Vulnerability Management CORE Security
Sponsored by: Core Security TechnologiesThis white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
-
Three Mistakes Companies Make When It Comes to Vulnerability Management
Sponsored by: Core Security TechnologiesIn this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Implementing an Effective Vulnerability Management Program
Sponsored by: TenableAccess this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
-
Ballarat Grammar Secures BYOD with HP Sentinel SDN
Sponsored by: Hewlett Packard EnterpriseIn this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Expect More From Your SIEM
Sponsored by: AT&T CybersecurityUnlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
-
Practitioner's Guide to Establishing an SOC
Sponsored by: AT&T CybersecurityThis white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
-
Next-Generation Vulnerability Management
Sponsored by: SAINT CorporationThis crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
-
Managing Web Security in an Increasing Challenging Threat Landscape
Sponsored by: TechTarget SecurityThis resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
-
Report: Cyber Security Attack and Incident Data
Sponsored by: IBMUncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
Information Security Magazine - April 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.