Skip to main content
 

vulnerabilities

Results 201 - 225 of 326Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website.
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 28, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton
    
Symantec
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management
    
Alert Logic
Published By: webmechanix     Published Date: Mar 06, 2014
Sadly, many companies aren’t. That’s why we created this free, online assessment to help you understand the COSO framework more intimately. Answer just 17 multiple choice questions (100% confidentiality guaranteed) & get instant feedback that highlights important flaws in your current systems & point you in the right direction. Don’t get caught with your pants down. Take a few minutes right now to gain understanding of key organizational vulnerabilities regarding the new COSO framework & stay ahead of the pack.
Tags : 
coso assessment, coso framework, coso guidelines, finance
    
webmechanix
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications
    
Kaspersky Lab
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
Lumension
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Tags : 
mobile application threats, mobile application, mobile, risk, api
    
HP - Enterprise
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.