Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Insider Threat Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Failure Mode Glyph Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Vulnerability Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Exploit Icon
Penetration Testing Icon
Honeypot Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Risk Icon
AI in Cybersecurity abstract concept vector illustrations.
Ethical hacker. Character conducting a security penetration test. White
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Threat Icon
 Vulnerability Icon for Risk Assessment
Failure Flat Icon
Cloud computing security breach for internet of things
Exploit Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Failure Mode Outline Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Programmer at work. Computer assisted design, developer testing program.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Zero Day Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Breach Icon
Risk
Penetration Testing Icon
Risk Assessment Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Security icons set vector with shadows on white background
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Market Data Icon  in black line style icon, style isolated on white background
 Vulnerability Scanner Technology Icon
Threat Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Risk Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Zero Day Glyph Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Vulnerability Icon
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Exploit Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Detection Icon
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Penetration Testing Icon
Penetration Testing Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Risk Factor Outline Icon
Cyber Threat Icon
Threat Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Mental health issues concept. Flat vector illustration
Flat illustration of man managing cybersecurity for remote work telecommuting security
Zero Day Blue Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Exploit Icon
Threat icon
Decryption Icon
Security Icon
Risk Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Emotional Vulnerability Vector Icon
Exposure Icon
Hacked line icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Security Testing Icon
Threat Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Computer security specialist online service or platform. Idea of digital
Risk Factor Blue White Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Exploit Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Risk Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Vulnerability Icon
 Stylish Vulnerability Scanner Icon
Emotional Vulnerability Vector Icon
Ethical hacker isolated cartoon vector illustrations.
Analytics Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Next page
/ 10