Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Vulnerability Assessment
You are here: Home \ Vulnerability Assessment \ Page 2
vulnerability assessments vs vulberability management
Posted on Monday, February 19th, 2018 by
The terms vulnerability scans, vulnerability assessments and vulnerability management are often mixed up and still cause confusion on many accounts. To make sure that your organization can focus on the most effective tactics when it becomes to dealing with vulnerabilities, we’ve explained the main differences between vulnerability assessments and vulnerability management once and for all.

Topics: Managed Security Services, MSS, Vulnerability Assessment, Vulnerability Management

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Eliminating Security Gaps with Vulnerability Assessments
Posted on Tuesday, August 15th, 2017 by
Want to eliminate the security gaps in your IT infrastructure? Your first stop should be vulnerability assessments.

Topics: Vulnerability Assessment

Weakness on Warning Road Sign
Posted on Tuesday, August 8th, 2017 by
Is your business ready for a cyber attack? The cyber security threat landscape is clearly more dangerous now than any time in history. While, historically, wars have been fought in the air, on land and on the seas, it now appears that the next war will be fought (or will begin) in cyber space. What are the next cyber threats to look out for and when will Executives take notice?

Topics: CISO, DDoS, Digital Transformation, Penetration Testing, Phishing, Ransomware, Vulnerability Assessment

Vulnerability Assessment
Posted on Tuesday, July 4th, 2017 by
As many as 15,000 new vulnerabilities are discovered each year, with many affecting major software systems including web browsers, operating systems, and other applications. Vulnerabilities, including missing patches and misconfigured applications, expose weaknesses to attackers and open organizations to costly cyber-attacks. In order to secure their IT assets, organizations today must maintain an awareness of the vulnerabilities in their environment and respond quickly to mitigate potential threats. One way to do so is through regular vulnerability assessments, a process to identify and quantify the security vulnerabilities in an organization’s environment. A vulnerability assessment program provides organizations with the knowledge, awareness, and risk background necessary to understand threats to their environment and react accordingly.

Topics: Risk management, Vulnerability Assessment

Vulnerability Assessment and Vulnerability Management Strategy
Posted on Tuesday, June 27th, 2017 by
Why regular vulnerability assessments help eliminating security gaps

Topics: Vulnerability Assessment

Business-person-stepping-up-a-staircase-33mcx74r1cvrjjl1h2o3y8
Posted on Thursday, April 13th, 2017 by
How vulnerability assessments help your company...

Topics: Vulnerability Assessment

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now