As an IT professional a big part of your job is to keep up with attacks and implement technologies that protect your company's network. Unfortunately, this job has become more difficult over the last few years as the complexity of the network's infrastructure has increased dramatically. A brief look at the CERT Coordination Center's vulnerability statistics confirms the challenge you currently face.
At TechRepublic we devote a great deal of our content to helping you with this security battle. Recently, we began producing a series of free audio Webcasts available to members that feature the thoughts and suggestions of real IT security professionals on specific security topics. Each audio Webcast is no more that 20 minutes in length, so the time commitment is minimal. Check out each link below and discover a better way to keep up to date on the security issues that matter to you:
- Prevent network vulnerabilities - The total number of new vulnerabilities reported this year has skyrocketed. Organizations simply lack the time and wherewithal to determine which ones are important to their business operations. However, with the right tools, services, and internal cooperation in place you can focus efforts where they are needed most to mitigate your exposure. This audio Webcast will examine some common characteristics of today's vulnerabilities and provide steps you can implement now to protect your network.
- Optimize your security plan - The time between notification and deployment of vulnerabilities has dwindled from months to hours. For busy IT Professionals this trend means finding faster alternatives for detection. One solution is using a Web services vendor. This audio Webcast will look at how Web services vendors can speed up the vulnerability detection process to narrow the window of time between discovery of a security risk and its removal.
- Top questions to ask a security firm - In order to combat today's numerous vulnerability threats, many organizations are turning to outsourced security firms that specialize in preempting these attacks before they reach critical mass. However, there are important questions that need to be asked before you turn your security function over to an outsider. To help with one of these questions, this audio Webcast will focus on what you should ask a security firm about its vulnerability database.