Vulnerability Management Research
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
How To Achieve Risk-Based Vulnerability Management
Sponsored by: AT&T CybersecurityInformation overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
Danger within: email and security awareness training strategies for effective account takeover protection
Sponsored by: MimecastIt’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
Application security: best practices and risks
Sponsored by: TechTarget ComputerWeekly.comSecurity professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
Ponemon - Costs and Consequences of Gaps in Vulnerability Response
Sponsored by: ServiceNowPonemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
-
How to Modernize Your Vulnerability Management Program
Sponsored by: ServiceNowAttackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
-
Incident Response Tools: How, When & Why to Use Them
Sponsored by: ClaranetIncident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
-
State and Local Governments Chart Their Path Toward Improved Digital Security
Sponsored by: Dell TechnologiesState and local governments are under attack from cyberespionage and malware, and they are exposed to a broad variety of security risks. New approaches are needed to make government IT less vulnerable. In this infographic, learn 7 best practices for cybersecurity in state and local governments.
-
IT Security Challenges for State and Local Government IT Departments
Sponsored by: Dell TechnologiesToday's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
Identifying Network Security Vulnerabilities
Sponsored by: Crosskey Cyber SecurityIT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
-
A Guide to Joining DevOps and Security
Sponsored by: Trend Micro, Inc.If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
-
PCI Compliance with Unified Security Management
Sponsored by: AT&T CybersecurityBecause organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.
-
The Perfect Rx for HIPAA Compliance
Sponsored by: AT&T CybersecurityComplying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
-
Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
Sponsored by: A10 NetworksMost companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
-
Logrythm's Security Analytics Platform: Product Overview
Sponsored by: LogRhythm, Inc.In this e-guide, expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a tool that leverages big data analytics and machine learning to help protect enterprises. Learn how this platform works, as well as insights on its support, cost, and deployment.
-
Why Security in DevOps is Essential to Software Development
Sponsored by: TechTarget SecurityWhat is the point of releasing new software that's loaded up with security vulnerabilities? Security is now an essential ingredient in software development. Inside this handbook, experts take a closer look at how IT professionals can fit security into their development process and how they will benefit from doing so.
-
How to Think like a Hacker to Stop Application Security Threats
Sponsored by: IBMFind out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
-
How to Find the Best DDoS Attack Prevention and Detection Tools
Sponsored by: TechTarget SecurityExplore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
The Truth After the Hype: Improve Mobile Data Security
Sponsored by: vmware airwatchIn this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
-
How To Build An Enterprise Application Security Program
Sponsored by: Symantec + Blue CoatBuilding an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.