Vulnerability management News
April 26, 2016
The 2016 Verizon DBIR skimps on data breach analysis and instead focuses on common issues, such as phishing, vulnerability management and access controls, which are still befuddling IT pros.
March 11, 2016
News roundup: DROWN attack affects millions of servers with an SSLv2 vulnerability; the Home Depot breach lawsuit settlement is pending; and Chinese smartphone-maker ZTE is sanctioned.
March 09, 2016
Patching systems can be time-consuming and troublesome, so one expert suggests crowdsourced vulnerability patching to make the process faster and easier.
February 01, 2016
A new revision to the Secunia Personal Software Inspector/Corporate Software Inspector lays some long-standing Windows 8 and Windows 10 errors to rest.
Vulnerability management Get Started
Bring yourself up to speed with our introductory content
Security reports are a good way for CISOs to communicate with the board of directors. Here are specific topics that should be included in the reporting. Continue Reading
Expert Ed Tittel looks at VeriSign iDefense threat intelligence service for providing data on today's top IT threats to organizations. Continue Reading
AWS penetration testing must be done in both cloud and on-premises infrastructures. Cloud security expert Rob Shapland offers pointers for conducting a successful AWS pen test. Continue Reading
Evaluate Vulnerability management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many endpoint management tools share common features, but there are more advanced functions IT can employ, too. Continue Reading
With new and improved features in Windows 10, plus ever-changing third-party utilities, IT administrators have plenty of desktop management tools at their disposal. That might seem like a good thing, but it's a double-edged sword. Lots of options on the table makes for a tough decision, and the tools often differ in such a way that they can't be compared easily. The best course of action is to figure out which features you need -- such as malware protection, threat intelligence and mobile device management -- then shortlist and test some tools from there.
Vendor-neutral rankings also help with the decision-making process. And if you need cutting-edge or newer kinds of endpoint support, you can base your search for the right tool on those features as well. Consider whether you need endpoint detection and response capabilities, for example, and go from there.Continue Reading
Expert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading
Manage Vulnerability management
Learn to apply best practices and optimize your operations.
Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading
Is the PCI DSS a sufficient guideline for implementing an application security program? Should organizations take steps beyond the mandated PCI compliance checklist? Continue Reading
Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan. Continue Reading
Problem Solve Vulnerability management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading
The open source Metasploit Framework is an essential tool to help enterprises detect new vulnerabilities. Michael Cobb explains why. Continue Reading
Today's enterprise app sec pro can be expected to work with as many as 200 programmers. Keeping up with the pace requires security automation. Continue Reading