ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

  • How To Achieve Risk-Based Vulnerability Management

    Sponsored by: AT&T Cybersecurity

    Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.

  • GoSecure Cybersecurity Perceptions Versus Reality

    Sponsored by: GoSecure

    This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.

  • Danger within: email and security awareness training strategies for effective account takeover protection

    Sponsored by: Mimecast

    It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Application security: best practices and risks

    Sponsored by: TechTarget ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Ponemon - Costs and Consequences of Gaps in Vulnerability Response

    Sponsored by: ServiceNow

    Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.

  • How to Modernize Your Vulnerability Management Program

    Sponsored by: ServiceNow

    Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • IT Security Challenges for State and Local Government IT Departments

    Sponsored by: Dell Technologies

    Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.

  • State and Local Governments Chart Their Path Toward Improved Digital Security

    Sponsored by: Dell Technologies

    State and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Identifying Network Security Vulnerabilities

    Sponsored by: Crosskey Cyber Security

    IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • PCI Compliance with Unified Security Management

    Sponsored by: AT&T Cybersecurity

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.

  • The Perfect Rx for HIPAA Compliance

    Sponsored by: AT&T Cybersecurity

    Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.

  • Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises

    Sponsored by: A10 Networks

    Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.

  • Logrythm's Security Analytics Platform: Product Overview

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.

  • Why Security in DevOps is Essential to Software Development

    Sponsored by: TechTarget Security

    What is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.

  • How to Think like a Hacker to Stop Application Security Threats

    Sponsored by: IBM

    Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: TechTarget Security

    Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: McAfee, Inc.

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • The Truth After the Hype: Improve Mobile Data Security

    Sponsored by: vmware airwatch

    In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Symantec + Blue Coat

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.