RSS feed Get our RSS feed

News by Topic

security vulnerabilities

Results 126 - 150 of 187Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : java, insecurity, vulverabilities, computing, security
     Lumension
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security
     Alert Logic
By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
     Microsoft Office 365
By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     LookingGlass Cyber Solutions
By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
     Tripwire
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
     Tripwire
By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : ibm, integrated security, security weakness, risk management, infrastructure security
     IBM
By: IBM     Published Date: Oct 02, 2015
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, bigfix, security qradar, security, endpoint intelligence, data security
     IBM
By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner, security
     IBM
By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, threat, endpoint, security, intelligence, qradar
     IBM
By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security
     IBM
By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, security intelligence, bigfix, technology, best practices, security
     IBM
By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, security, big fix, advanced threats, security, security intelligence, endpoint security
     IBM
By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : ibm, security, identity governance and intelligence, identity governance, entitlements, compliance
     IBM
By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : cisco, security, report, 2015, threat, intelligence, capabilities, benchmark
     Cisco
By: Coverity     Published Date: Mar 13, 2012
To maximize efficiencies, developers need to manage security and quality defects as the code is being written and as part of their existing development and triage workflows. Download the complete paper to learn how you can manage security risks!
Tags : security, vulnerability, development, testing, costs, quality, workflows, revenue
     Coverity
By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
     IBM
By: Coverity     Published Date: Apr 20, 2012
Download this white paper to learn how you can empower your developers to manage security risks during development.
Tags : development, lifecycle, software, development, security, secure, practices, phases
     Coverity
By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : vulnerability management, security, threat management, security, assessment
     SilverSky
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics