Vulnerability Management White Papers

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 1 - 25 of 475Sort Results By: Published Date | Title | Company Name
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009

The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.

Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: FTI Consulting     Published Date: Mar 03, 2017

2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.

Tags : fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business continuity, security policies, best practices, risk management, project management, vulnerability management, business technology, social media, reputation monitoring
    
By: Secureworks     Published Date: Dec 09, 2016

The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.

Tags : cybersecurity, managed security services, security, threat and vulnerability management, risk management, vulnerability management
    
By: Secureworks     Published Date: Nov 11, 2016

This paper outlines the discrete layers and levels of a world-class security organisation and programme, and how organisations can take advantage of services from SecureWorks to support their progress toward worldclass status.

Tags : managed security services, security, secureworks, threat and vulnerability management, security, security architecture, cyber security, vulnerability management
    
By: Secureworks     Published Date: Nov 11, 2016

This paper sets out five major areas of focus for the practical CISO.

Tags : managed security services, ciso, security, risk management, security, threat and vulnerability management, vulnerability management, data loss prevention
    
By: Secureworks     Published Date: Nov 11, 2016

This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

Tags : managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management, data loss prevention
    
By: Secureworks     Published Date: Nov 11, 2016

This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.

Tags : managed security services, cybersecurity, issps, security, threat and vulnerability management, vulnerability management
    
By: Secureworks     Published Date: Nov 11, 2016

To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.

Tags : managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security, intrusion prevention, vulnerability management
    
By: Lenovo     Published Date: Oct 14, 2016

IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.

Tags : security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management, data loss prevention
    
By: Qualys     Published Date: Sep 29, 2016

One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work.

Tags : protection, vulnerability, assetview, malware, web application, vulnerability management, cloud computing
    
By: Qualys     Published Date: Sep 29, 2016

With ThreatPROTECT, you get a holistic, contextual and continually updated “at a glance” view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now

Tags : protection, threats, data, vulnerabilities, data protection, vulnerability management, cloud computing
    
By: Kaspersky     Published Date: Aug 17, 2016

Find the answers you need to know by downloading our new ebook. We’ll break down the statistics on the biggest threats that enterprises face and how you can defend your business.

Tags : kaspersky, threat management, vulnerability, external threat, hacker detection, intrusion prevention, it spending, data protection, vulnerability management
    
By: Adobe     Published Date: Apr 25, 2016

This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?

Tags : data security, data management, mobile security, application security, vulnerability management, mobile marketing, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?

Tags : enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?

Tags : data security, data management, mobile security, application security, vulnerability management, mobile marketing, mobile device management
    
By: Adobe     Published Date: Apr 25, 2016

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?

Tags : enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
By: ArborNetworks     Published Date: Feb 12, 2016

Today’s DDoS attacks are an easy way to interrupt businesses.

Tags : ddos protection, arbor networks, insegment, best practices, policies, data, application security, ddos, internet security, intrusion prevention, security policies, vulnerability management
    
By: Kaspersky     Published Date: Jan 22, 2016

Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?

Tags : kaspersky, cybercrime, hackers, malware, threat protection, network security, firewalls, hacker detection, intrusion prevention, vulnerability management
    
By: Druva     Published Date: Jan 04, 2016

Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.

Tags : enterprise, endpoints, backup, vendor comparison, cloud, on premise, disaster recovery, vulnerability management
    
By: Centrify     Published Date: Sep 08, 2015

Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.

Tags : device management, security management, mobility, application security, management solutions, internet security, vulnerability management, mobile device management
    
By: AlienVault     Published Date: Aug 13, 2015

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

Tags : alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection, security management, vulnerability management, data loss prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.