Vulnerability Management Research
-
Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
Sponsored by: IBM and SI ArchitectsIn this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
-
DNS Firewalls and Defense Tactics
Sponsored by: InfobloxGain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
-
Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
Sponsored by: eIQnetworksThis valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
-
Web-Facing Applications: Mitigating Likely Web Application Threats
Sponsored by: TechTarget SecurityIn this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Web Browser Security Features Make Attacks Harder
Sponsored by: Symantec CorporationIn this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
-
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
Sponsored by: TechTarget SecurityIn this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
-
Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
Sponsored by: Symantec CorporationThis expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
Cybersecurity Information Sharing: Establishing New Protocols
Sponsored by: BMC Software, Inc.This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
-
ISM Essentials Guide – Threat Management
Sponsored by: TechTarget SecurityIn this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
-
E-Guide: Bringing Value to Application Monitoring Through SIM
Sponsored by: TechTarget SecurityThis expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
-
E-Guide: Clearing Up the Confusion to Prepare for APTs
Sponsored by: Dell SecureWorksConsult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
-
Information Security Magazine – November 2012
Sponsored by: Dell SonicWALLConsult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
-
STATE OF DNS AVAILABILITY REPORT
Sponsored by: Verisign, Inc.View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
-
2012 - Endpoint Security Best Practices Survey
Sponsored by: Symantec CorporationConsult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
-
Patch management: Fixing vulnerabilities before they are exploited
Sponsored by: GFI LanGuardSoftware updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
-
HP Mobile Application Security
Sponsored by: Hewlett Packard EnterpriseWatch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
-
HP Fortify on Demand - Enterprise Software Security in the Cloud
Sponsored by: Hewlett Packard EnterpriseHP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
-
HP Fortify Software Security Center- Proactively Eliminate Risk in Software
Sponsored by: Hewlett Packard EnterpriseLearn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
-
Rewriting the Rules of Patch Management
Sponsored by: IBMBy implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
-
Webroot Secure Anywhere - Endpoint Protection
Sponsored by: OpenText Security SolutionsThreats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
-
Protect citizen data with IBM Rational software
Sponsored by: IBMDigital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
-
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
Sponsored by: Rapid7Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
-
Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
Sponsored by: Symantec CorporationIn this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.