Skip to main content
 

vulnerabilities

Results 301 - 325 of 327Sort Results By: Published Date | Title | Company Name
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management
    
Qualys
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement
    
Shavlik Technologies
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common browser vulnerabilities used to execute these attacks What attackers do next to take control of the system How to catch it before the attacker moves further into your network
Tags : 
    
AlienVault
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : 
web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0, scanning, saas
    
Qualys
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade
    
Third Brigade
Published By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : 
ibm, ibm mi, ibm grm, web security, internet security, application security
    
IBM
Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic
    
Cenzic
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: HP - Enterprise     Published Date: Jan 24, 2013
Do you know where your vulnerabilities are? This white paper discusses the log management landscape and the solution that protects modern networks.
Tags : 
log manager, logger, risk management, enterprise software, security, compliance
    
HP - Enterprise
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naiveté.
Tags : 
dell, cyber security shield, windows vista security, vista uac, dell assessment
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.