> Research Library > Technology > Security > Vulnerability Management
 

Find Research


Add Research

Get your company's research in the hands of targeted business professionals.

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 1 - 25 of 475Sort Results By: Published Date | Title | Company Name
White Paper Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting
    
Ounce Labs, an IBM Company
White Paper Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa
    
Ounce Labs, an IBM Company
White Paper Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss
    
Ounce Labs, an IBM Company
White Paper Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection
    
Proofpoint
White Paper Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks
    
FTI Consulting
White Paper Published By: Secureworks     Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Tags : 
cybersecurity, managed security services, security, threat and vulnerability management, risk management
    
Secureworks
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
This paper outlines the discrete layers and levels of a world-class security organisation and programme, and how organisations can take advantage of services from SecureWorks to support their progress toward worldclass status.
Tags : 
managed security services, security, secureworks, threat and vulnerability management, security
    
Secureworks
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security
    
Secureworks
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security
    
Secureworks
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Tags : 
managed security services, cybersecurity, issps, security, threat and vulnerability management
    
Secureworks
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : 
managed security services, risk management, security, threat and vulnerability management, attacks
    
Secureworks
White Paper Published By: Lenovo     Published Date: Oct 14, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo
White Paper Published By: Qualys     Published Date: Sep 29, 2016
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work.
Tags : 
protection, vulnerability, assetview, malware, web application
    
Qualys
White Paper Published By: Qualys     Published Date: Sep 29, 2016
With ThreatPROTECT, you get a holistic, contextual and continually updated “at a glance” view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now
Tags : 
protection, threats, data, vulnerabilities, data protection
    
Qualys
White Paper Published By: Kaspersky     Published Date: Aug 17, 2016
Find the answers you need to know by downloading our new ebook. We’ll break down the statistics on the biggest threats that enterprises face and how you can defend your business.
Tags : 
kaspersky, threat management, vulnerability, external threat, hacker detection
    
Kaspersky
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe
White Paper Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies
    
ArborNetworks
White Paper Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection
    
Kaspersky
White Paper Published By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : 
enterprise, endpoints, backup, vendor comparison, cloud
    
Druva
White Paper Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
This whitepaper addresses new elastic iPaaS requirements in detail while highlighting the importance of each.
Tags : 
elastic ipaas requirements, hybrid deployments, minimal lifecycle management, future-proofing, metadata-driven integration
    
SnapLogic
Webinar Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library