<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / vulnerabilities</title>
<link>http://netvouz.com/lillymark/tag/vulnerabilities?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;vulnerabilities&quot; on Netvouz</description>
<item><title>Asset and Vulnerability Management</title>
<link>http://www.egestalt.com/vulnerability-management.html</link>
<description>Vulnerability management is a process that protects your valuable data, customer information, critical network assets &amp; intellectual property.  eGestalt offers SecureGRC Asset &amp; Vulnerability Software that helps manage data &amp; tasks associated with assets &amp; vulnerabilities.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 01 Mar 2012 09:24:37 GMT</pubDate>
</item><item><title>Effective Vulnerability Management Solutions</title>
<link>http://www.egestalt.com/vulnerability-management.html</link>
<description>eGestalt’s Vulnerability Management solution protects your valuable data &amp; intellectual property proactively manages vulnerabilities to reduce the potential for misuse &amp; involves considerably less time &amp; effort than responding after exploitation has occurred.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 11 Mar 2013 10:06:35 GMT</pubDate>
</item><item><title>How to neutralize vulnerabilities in a mixed cloud on premise environment</title>
<link>http://www.youtube.com/watch?v=JzivT5kDaz0</link>
<description>Modern cloud and on premise applications have become complex collections of Web 2.0 functionality, web services, NoSQL Databases, cloud platforms, technologies, etc. While this has resulted in immense benefits to customers, it has also increased the attack surface for web attackers. 60% of cloud apps are vulnerable and breaches of sensitive enterprise data can include customer information, financial information, healthcare data, etc. Check this video for more information.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 25 Feb 2014 04:37:45 GMT</pubDate>
</item><item><title>How to neutralize vulnerabilities in a mixed cloud- on premise environment</title>
<link>http://www.estuate.com/events/webinar-in-december-03</link>
<description>Join us for this webinar on Tue, December 03 @ 10AM PST, focusing on How to neutralize vulnerabilities in a mixed cloud- on premise environment.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 02 Dec 2013 11:01:21 GMT</pubDate>
</item><item><title>Preventing Shell Upload Vulnerabilities in PHP</title>
<link>http://www.computer.org/portal/web/computingnow/security/content?g=53319&amp;type=article&amp;urlTitle=preventing-shell-upload-vulnerabilities-in-php</link>
<description>Shell upload vulnerabilities allow an attacker to upload a malicious PHP file and execute it by accessing it via a web browser. The &quot;shell&quot; is a PHP script that allows the attacker to control the server - essentially a backdoor program, similar in functionality to a trojan for personal computers.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 19 Feb 2014 04:52:08 GMT</pubDate>
</item></channel></rss>