Vulnerability Management White Papers

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 1 - 25 of 374Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.

Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes, anti spam, anti spyware, anti virus, phishing
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.

Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes, anti spam, anti spyware, anti virus, phishing
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.

Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes, anti spam, anti spyware, anti virus, phishing
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.

Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes, anti spam, anti spyware, anti virus, phishing
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Symantec     Published Date: Jul 30, 2014

This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.

Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes, anti spam, anti spyware, anti virus, phishing
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.