Searching all of TechTarget| 18,251 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by WhatIs.com

SearchSecurity

By Michael Cobb Problem Solve Mar 25, 2016

How to tell a security backdoor from a vulnerability

Security backdoors and security vulnerabilities can often be confused with one another. Expert Michael Cobb offers guidance on distinguishing the two. Continue Reading

SearchSecurity

By Brad Causey Problem Solve May 03, 2016

How to resolve Web application security vulnerabilities

Web application security vulnerabilities exist from browser to SSL/TLS. Expert Brad Causey explains how application security testing and Web application firewalls can address this. Continue Reading

SearchCompliance

By Ben Cole Evaluate Apr 07, 2016

Governance tactics to reduce cybersecurity vulnerabilities

Companies' huge data volumes create numerous cybersecurity challenges, but a strong governance program provides a big boost to data protection efforts. Continue Reading

SearchSecurity

By Ed Tittel Evaluate Jan 12, 2016

Introduction to vulnerability management tools

Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading

SearchSecurity

By Michael Heller News Mar 09, 2016

Crowdsourced vulnerability patching could save us all

Patching systems can be time-consuming and troublesome, so one expert suggests crowdsourced vulnerability patching to make the process faster and easier. Continue Reading

SearchSecurity

By Peter Loshin News Apr 29, 2016

Apple/FBI battle continues over iPhone vulnerabilities

More fallout from the Apple/FBI conflict: The second iPhone suit was dropped; the FBI can't provide details of a tool used to unlock the San Bernardino shooter's phone. Continue Reading

SearchSecurity

By Michael Cobb Get Started Apr 21, 2016

Breaking down the DROWN attack and SSLv2 vulnerability

A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Continue Reading

SearchSecurity

By Peter Loshin News Apr 21, 2016

JBoss vulnerability highlights dangers of unpatched systems

Up to 3.2 million servers with unpatched JBoss vulnerability from 2010 are open to spread ransomware through networks; experts urge keeping up with software patches to stay safe. Continue Reading

SearchSecurity

By Peter Loshin News Apr 14, 2016

Badlock vulnerability proves a bust for responsible disclosure

The much-hyped Badlock bug is still important to patch, but raised issues with celebrity vulnerability promotion and responsible disclosure of security vulnerabilities. Continue Reading

SearchSecurity

By Ed Tittel Evaluate Feb 09, 2016

Comparing the top vulnerability management tools

Expert Ed Tittel compares how the top-rated vulnerability management tools measure up against each other so you can select the right one for your organization. Continue Reading