Security vulnerability management News
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
October 13, 2010
In the wake of the global economic crisis, many financial firms are struggling to meet tough regulations while defending against both accidental data leakage and a constant barrage of external attacks.
August 06, 2009
At Black Hat, a researcher unveils a tool that obfuscates fixes in Windows security patches, making them invisible to binary diffing suites and automated reverse engineering.
June 11, 2009
Data loss prevention can work for the midmarket if organizations have streamlined requirements and can easily identify and locate sensitive data.
Security vulnerability management Get Started
Bring yourself up to speed with our introductory content
In 2007, Julio Gonzalez, director of IT, GRC and network operations at Ryder Truck Rental, kicked off a PCI project aimed at addressing any credit card exposures. Continue Reading
This podcast will explore the various security merits of current browsers and give tips on how to decide which is right for your organization. Continue Reading
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure... (Continued) Continue Reading
Evaluate Security vulnerability management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge ... Continue Reading
Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and ... Continue Reading
Product ReviewsPowered by IT Central Station
It has helped us to find vulnerability gaps, and compliance flaws, but reporting needs to be more intelligent and precise.Powered by IT Central Station
Valuable Features: Vulnerability Management Policy Compliance Web application Scanning Malware Detection Continuous Monitoring • Improvements...Continue Reading
Powered by IT Central Station
Valuable Features: The feature where the solutions to issues are mentioned in the reports. • Improvements to My Organization: It's...Continue Reading
It's worth the investment, but score calculation needs to be improved. I had to manually re-calculate scoring at times.Powered by IT Central Station
Valuable Features: The interface is pretty good, as all the instructions are clear enough. The way you can create groups or scheduling scans...Continue Reading
Manage Security vulnerability management
Learn to apply best practices and optimize your operations.
These five tips will help your organization apply quality-of-service controls on a network perimeter firewall. Continue Reading
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
Booting a system from a virtual hard drive is one of the perks of Windows 7. After reviewing the security benefits, Tony Bradley offers a step-by-step plan for creating a VHD. Continue Reading
Problem Solve Security vulnerability management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process. Continue Reading
Nmap, Nessus and Nikto are penetration testing tools that security operators can use to conduct pentests on their networks and applications. Continue Reading
Many patch management systems fail to address endpoint application security. Tom Chmielarski suggests three areas to examine to ensure that your endpoint applications are secure. Continue Reading