Vulnerability Assessments Research
-
Detecting Common Exploit Paths Exposed on the Internet
Sponsored by: MandiantWhat can you do to defend yourself against data exposure? Mandiant suggests first understanding your attack surface from the viewpoint of an adversary. Read this paper to dive into their study data, take a closer look at the top 5 security issues identified, and discover 7 ways to gain a holistic look at your attack surface.
-
Infographic: 5 essential open source cybersecurity tools for 2022
Sponsored by: TechTarget ComputerWeekly.comThere are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
How To Achieve Risk-Based Vulnerability Management
Sponsored by: AT&T CybersecurityInformation overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
Ponemon - Costs and Consequences of Gaps in Vulnerability Response
Sponsored by: ServiceNowPonemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
-
How to Modernize Your Vulnerability Management Program
Sponsored by: ServiceNowAttackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
-
IT Security Challenges for State and Local Government IT Departments
Sponsored by: Dell TechnologiesToday's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
-
State and Local Governments Chart Their Path Toward Improved Digital Security
Sponsored by: Dell TechnologiesState and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
-
Application security: best practices and risks
Sponsored by: TechTarget ComputerWeekly.comSecurity professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
Identifying Network Security Vulnerabilities
Sponsored by: Crosskey Cyber SecurityIT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
-
A Guide to Joining DevOps and Security
Sponsored by: Trend Micro, Inc.If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
The Truth After the Hype: Improve Mobile Data Security
Sponsored by: vmware airwatchIn this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
If A Hacker Wants Your Data, Make Sure They Really Work For It
Sponsored by: Carbon BlackThis e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
-
Endpoint threat detection gets more response
Sponsored by: Hewlett Packard EnterpriseDiscover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
-
Tips to Secure your Virtualized Data Center
Sponsored by: TechData - KasperskyThis e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
What to Look for in Vulnerability Management
Sponsored by: TechTarget SecurityThis Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
-
Information Security Magazine – The Hunt for Data Analytics
Sponsored by: TechTarget SecurityBig data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
-
Why Every CIO Should Consider Vulnerability Assessment a Necessity
Sponsored by: IBMIn this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
-
Cost of a Breach Rising; How to Protect Against It
Sponsored by: TaaSeraThis expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
-
Study on Cybercrime's Cost to Business
Sponsored by: Hewlett Packard EnterpriseThis exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.