Searching all of TechTarget| 16,680 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by


By Mike Chapple Evaluate Oct 09, 2015

What to look for in vulnerability management

Every enterprise has its security vulnerabilities and some are easy to spot. The trick is how to prioritize and fix the flaws in the system. This is an increasingly difficult task for information security teams, ... Continue Reading


Sep 25, 2015

Secunia Vulnerability Review

The absolute number of IT security vulnerabilities detected in Secunia's 2015 annual vulnerability survey reached 15,435, discovered in 3,870 applications from 500 suppliers. Continue Reading


By Kevin Beaver Problem Solve Nov 04, 2015

Be on the lookout for Linux security vulnerabilities

Some of the most common Linux security vulnerabilities are also Windows vulnerabilities. They're all fairly easy to guard against, but some shops overlook securing any Linux systems that may be on their network. Continue Reading


By Mike Chapple Evaluate Oct 01, 2015

Choose the best vulnerability assessment tools

This Buyer's Essentials guide helps InfoSec pros assess vulnerability management products by explaining how they work and by highlighting key features corporate buyers should look for so they can evaluate vendor ... Continue Reading


Sep 25, 2015

How to fully test IT networks for vulnerabilities

Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading


By Michael Cobb Problem Solve Nov 20, 2015

How can address bar spoofing vulnerabilities be prevented?

Address bar spoofing attacks can be detrimental to an organization. Expert Michael Cobb details several vulnerabilities and explains how to defend against the threat. Continue Reading


By Peter Loshin News Nov 13, 2015

Java vulnerability caused by unpatched open source library

News roundup: WebSphere, JBoss, Jenkins and more hit by Java vulnerability in an open source library. Plus, SAP HANA deals with critical vulnerabilities, and more. Continue Reading


By Michael Cobb Problem Solve Nov 13, 2015

How does the Logjam vulnerability affect TLS encryption?

Expert Michael Cobb discusses the TLS protocol flaw dubbed Logjam and explains how to detect if enterprise systems are at risk, as well as how to remediate them. Continue Reading


By Warwick Ashford Sep 09, 2015

WhatsApp fixes security vulnerability

Security researchers have praised Facebook's WhatsApp cross-platform messenger service for its quick response to a vulnerability disclosure Continue Reading


By Ben Cole Manage Nov 11, 2015

Mobile application vulnerabilities remain a forgotten security threat

Despite an increased focus on data security protection, mobile application vulnerabilities are still often overlooked by both businesses and consumers. Continue Reading