Vulnerability Management Research
-
The Rise of Cloud-based Application Security Vulnerabilities
Sponsored by: Symantec + Blue CoatWhile it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.
-
5 Ways to Prevent a Ransomware Infection through Network Security
Sponsored by: IBMEven though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
If A Hacker Wants Your Data, Make Sure They Really Work For It
Sponsored by: Carbon BlackThis e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
-
Endpoint threat detection gets more response
Sponsored by: Hewlett Packard EnterpriseDiscover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
-
Removing Malware and Undetectable Windows AppLocker
Sponsored by: Check Point Software Technologies Ltd.A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.
-
Tips to Secure your Virtualized Data Center
Sponsored by: TechData - KasperskyThis e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
-
Cybersecurity Risks Masked by Controversial Vulnerability Counts
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
-
Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
Sponsored by: Symantec Website SecurityIn this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
-
Broadening Your VDI Horizon Beyond Thin Client Devices
Sponsored by: Dell, Inc. and Intel®This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.
-
What to Look for in Vulnerability Management
Sponsored by: TechTarget SecurityThis Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Information Security Magazine – The Hunt for Data Analytics
Sponsored by: TechTarget SecurityBig data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
-
Why Every CIO Should Consider Vulnerability Assessment a Necessity
Sponsored by: IBMIn this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
Protecting This House: IT's Role in Cloud Security
Sponsored by: TechTarget Cloud ComputingHaving a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
-
Cost of a Breach Rising; How to Protect Against It
Sponsored by: TaaSeraThis expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
-
Study on Cybercrime's Cost to Business
Sponsored by: Hewlett Packard EnterpriseThis exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
-
How to Deal with Increasing DDOS Attacks
Sponsored by: Verisign, Inc.This expert e-guide explores how to protect your organization from distributed denial of service attacks.
-
High Alert on Cyber-Risk and Cyber-Security Preparedness
Sponsored by: SurfWatch LabsThis expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
-
How Threat Intelligence Can Give Enterprise Security the Upper Hand
Sponsored by: SurfWatch LabsThis expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.
-
Putting Security on Auto-Pilot: What Works, What Doesn't
Sponsored by: TechTarget SecurityThis technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
-
6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
Sponsored by: Symantec & Blue Coat SystemsHow do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.