Host Vulnerability Assessment Reports

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TechTarget ComputerWeekly.com

Channel executives see need to bolster hospital IT security
sponsored by Hewlett Packard Enterprise
EGUIDE: Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett Packard Enterprise

Check the network before moving to the cloud
sponsored by TechTarget Security
EGUIDE: Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

TechTarget Security

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Resource Center: Stop Threats and Prevent Data Loss
sponsored by McAfee, Inc.
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

McAfee, Inc.