TITLE

Using Vulnerability Management to Proactively Prevent Security Breaches

AUTHOR(S)
Christly, John
PUB. DATE
September 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p96
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the use of vulnerability management as a method to prevent the problems on security breaches in the U.S. It has been suggested that computer devices in a network must be understood to be able to know the things being secured. Using NESSUS, a proprietary comprehensive vulnerability scanning software, is efficient to check for holes considering that the tool can also perform security checks.
ACCESSION #
44064719

 

Related Articles

  • An Approach for Cross-Domain Intrusion Detection. Nguyen, Thuy; Gondree, Mark; Khosalim, Jean; Shifflett, David; Levin, Timothy; Irvine, Cynthia // Proceedings of the International Conference on Information Warfa;2012, p203 

    Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security levels, however, presents subtle and complicated challenges. Analysis of...

  • RECENT RELEASES.  // Information Security;Oct2004, Vol. 7 Issue 10, p67 

    Provides information on several recently launched computer security systems and software as of October 2004. StealthWatch 4.1 anomaly detection solution from Lancope; Firebox X Edge appliance from WatchGuard Technologies; IronMail 4.5 e-mail security management solution from CipherTrust.

  • SONICWALL DEBUTS NETWORK SECURITY APPLIANCE.  // Computer Security Update;Jul2007, Vol. 8 Issue 7, p4 

    The article reports on the release of the SonicWALL Network Security Appliance (NSA) E7500, a new gateway security appliance from SonicWALL Inc. in Sunnyvale, California. It is stated that the Internet security solution offers deep packet inspection security and is easy to manage in larger...

  • Software Assurance: Embedding Security into the Software Development Lifecycle. Paul, Mano // Software World;Nov2008, Vol. 39 Issue 6, p3 

    The article provides information on software assurance. It gives a background of the persistence of insecure software and security flaws. An overview of the current state of the development community is also presented. It defines secure software as a software intended to deliver security...

  • PROTECT MOBILE AGENT AGAINST MALICIOUS HOST USING PARTIAL-MOBILITY MECHANISM. Mohamed Ahmed, Tarig // International Journal in Foundations of Computer Science & Techn;Nov2013, Vol. 3 Issue 6, p41 

    A mobile agent is a promising area in distributed systems. It is a new technology for computers to communicate. Despite the multiple benefits of the mobile agent, but there are several obstacles to its spread. The mobile agent protection is one of these obstacles. In this paper a new mechanism...

  • NetlQ's Security Manager does an impressive job sorting through security. Andress, Mandy // Network World;7/19/2004, Vol. 21 Issue 29, p37 

    Evaluates the Security Manager 5.0 security event management software from NetIQ Corp. INSET: How We Did It.

  • Endpoints hanging.  // Communications News;Jun2007, Vol. 44 Issue 6, p8 

    The article looks at how enterprises are still not securing their network endpoints as needed, according to a study conducted by Promisec, which offers a clientless endpoint security management product. The report is gleaned from audits performed at several large organizations covering numerous...

  • Building Software Securely from the Ground Up. Ghosh, Anup K.; Howell, Chuck; Whittaker, James A. // IEEE Software;Jan/Feb2002, Vol. 19 Issue 1, p14 

    Introduces a series of articles dealing with how to build software systems securely from the ground up. Enhanced understanding of how security concerns should influence all aspects of software design, implementation and testing; Types of approaches and point solutions advocated by computer...

  • A good defense goes to the desktop. Schwartau // Network World;12/07/98, Vol. 15 Issue 49, p53 

    Explains how to protect corporate computer networks from unauthorized access. Intranet firewalls; Desktop security; Signal 9 Solutions' PCFirewall security software; Internet Relay Chat.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics