vulnerability

Results 301 - 325 of 374Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: Rapid7     Published Date: Oct 15, 2012
The need for real-time vulnerability management and risk assessment
Tags : 
rapid7, data security, vulnerability management, risk assessment, virtual machine, virtualization, it infrastructure, data management
    
Rapid7
Published By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in todays environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : 
ibm, government, cyber, security, intelligence, information, vulnerability, fraud
    
IBM
Published By: Cisco     Published Date: Mar 17, 2017
Theres a war being waged on all our networks, and security researchers around the world are on the front lines. Heres the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in todays stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, its no longer a question of if but when theyll be attacked.. If youre like most financial institutions, you have controls that identify breaches, but need proper procedures thatll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIECs cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack
    
BAE Systems
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability, anti spam, anti spyware
    
CREDANT Technologies
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits even when a zero-day vulnerability is used.
Tags : 
benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
Kaspersky
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors And How To Fix Them Email. You use it constantly. And its the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, its supposed to just work, right? But if email isnt part of an organizations core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and complexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of whack-a-mole exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam
    
McAfee
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
    
HP - Enterprise
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management
    
Qualys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.