Security Vulnerabilities Reports

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Endpoint Security Technology
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by TechTarget Security
EGUIDE: In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

TechTarget Security

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.