vulnerabilities management

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management
     Alert Logic
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
     AlienVault
By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection
     Cenzic
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
     FICO
By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
     Flexera
By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : mission critical, security, datacenter, data center, storage security, storage
     HP
By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: HP - Enterprise     Published Date: Jan 24, 2013
Do you know where your vulnerabilities are? This white paper discusses the log management landscape and the solution that protects modern networks.
Tags : log manager, logger, risk management, enterprise software, security, compliance
     HP - Enterprise
By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : access manager, identity federation, risk management, authentication capabilities, threat protection
     IBM
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: May 03, 2011
Why fixing third-party application vulnerabilities is at the core of sound government information security-and how to make sure patch management is optimizing your security posture.
Tags : patch management, security, lumension, government security, cyber attack, vulnerability management
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
     Lumension
By: Qualys     Published Date: Feb 04, 2010
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management
     Qualys
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com