ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Research

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • The Right Tool for the Right Job: An Application Security Tools Report Card

    Sponsored by: IBM

    This white paper examines the most common tools found in the enterprise application security environment.

  • Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

    Sponsored by: Wave Systems Corp.

    Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.

  • The Anatomy of a Cross-Site Scripting Campaign

    Sponsored by: Imperva

    XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  • Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Sponsored by: VeriSign Australia

    This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity

    Sponsored by: Information Security Magazine

    The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

  • Data Protection Solutions at Midsize Organizations

    Sponsored by: Trend Micro, Inc.

    In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.

  • Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management

    Sponsored by: eEye Digital Security

    In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.

  • Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware

    Sponsored by: Sophos

    Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.

  • Top 5 Threat Protection Best Practices

    Sponsored by: Sophos

    Today’s corporate networks face a barrage of threats, from malware to accidental data loss. The endpoints receive the brunt of these attacks, and if they are not protected they can serve as a threat portal to the entire network. This paper offers advice to help you protect your endpoints and your network against an ever-growing body of threats.

  • ForwardView: Four Areas of Security Vital to Business Health

    Sponsored by: IBM

    Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  • How to Let Staff Use Their Personal Technology Securely

    Sponsored by: AVG Technologies USA, Inc.

    Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely.

  • Successfully Mitigating Corporate Risk

    Sponsored by: AT&T Corp

    This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.

  • How Malware Can Sneak Into Your Company Networks and How to Deal With It

    Sponsored by: AVG Technologies USA, Inc.

    Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.

  • Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities

    Sponsored by: IBM

    Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • Databases at Risk: Current State of Database Security (Enterprise Strategy Group)

    Sponsored by: IBM

    This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise.

  • Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA

    Sponsored by: Imperva

    Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.

  • Take a Holistic Approach to Business-Driven Security

    Sponsored by: IBM

    This paper introduces actions that organizations can take to drive security efforts from a business and operational perspective and discusses how security leadership from IBM can help enable their success.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • NERC: What You Need to Know

    Sponsored by: TechTarget Security

    The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.