Searching all of TechTarget| 17,440 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by WhatIs.com

SearchSecurity

By Ed Tittel Evaluate Jan 12, 2016

Introduction to vulnerability management tools

Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading

SearchSecurity

By Michael Heller News Jan 26, 2016

Fortinet SSH vulnerability more widespread than thought

Fortinet denies that a vulnerability found in many of its products is a true backdoor, but finds that the flaw is more widespread than once thought. Continue Reading

SearchSecurity

By Ed Tittel Evaluate Jan 14, 2016

The business case for vulnerability management tools

Expert Ed Tittel describes business use cases for vulnerability management tools and examines how organizations of all sizes benefit from these products. Continue Reading

SearchSecurity

By Mike Chapple Evaluate Oct 09, 2015

What to look for in vulnerability management

Every enterprise has its security vulnerabilities and some are easy to spot. The trick is how to prioritize and fix the flaws in the system. This is an increasingly difficult task for information security teams, ... Continue Reading

ComputerWeekly

Sep 25, 2015

Secunia Vulnerability Review

The absolute number of IT security vulnerabilities detected in Secunia's 2015 annual vulnerability survey reached 15,435, discovered in 3,870 applications from 500 suppliers. Continue Reading

SearchSecurity

By Ed Tittel Evaluate Jan 19, 2016

Seven criteria for buying vulnerability management tools

Expert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading

SearchAWS

By George Lawton Get Started Jan 13, 2016

Shore up vulnerabilities to secure ECS, Docker containers

For all of its popularity, container technology still has security vulnerabilities that IT teams must address. Following several best practices can keep resources safe. Continue Reading

SearchSecurity

By Michael Heller News Jan 12, 2016

OAuth vulnerabilities must be fixed in the standard

Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself. Continue Reading

SearchEnterpriseDesktop

By Kevin Beaver Problem Solve Nov 04, 2015

Be on the lookout for Linux security vulnerabilities

Some of the most common Linux security vulnerabilities are also Windows vulnerabilities. They're all fairly easy to guard against, but some shops overlook securing any Linux systems that may be on their network. Continue Reading

SearchSecurity

By Michael Cobb Problem Solve Jan 08, 2016

How can new template injection vulnerabilities be stopped?

A newly discovered injection vulnerability affecting template engines could spell trouble for enterprises. Expert Michael Cobb explains how to stop it. Continue Reading