Web-facing applications: Security assessment tools and strategies
sponsored by TechTarget Security
WHITE PAPER:
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012
|
|
|
Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER:
This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013
|
|
|
Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER:
Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013
|
|
|
Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER:
This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013
|
|
|
Practitioner's Guide to Establishing an SOC
sponsored by AT&T Cybersecurity
WHITE PAPER:
This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013
|
|
|
Next-Generation Vulnerability Management
sponsored by SAINT Corporation
WHITE PAPER:
This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
Posted: 12 Jul 2013 | Published: 12 Jul 2013
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
Report: Cyber Security Attack and Incident Data
sponsored by IBM
WHITE PAPER:
Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
Posted: 15 May 2013 | Published: 29 Mar 2013
|
|
|
STATE OF DNS AVAILABILITY REPORT
sponsored by Verisign, Inc.
WHITE PAPER:
View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012
|
|
|
2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER:
Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012
|
|
|
Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER:
Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012
|
|
|
HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012
|
|
|
HP Fortify Software Security Center- Proactively Eliminate Risk in Software
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
Posted: 24 Aug 2012 | Published: 24 Aug 2012
|
|
|
Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER:
By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011
|
|
|
Webroot Secure Anywhere - Endpoint Protection
sponsored by OpenText Security Solutions
WHITE PAPER:
Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012
|
|
|
Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER:
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012
|
|
|
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
|
|
|
Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER:
Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012
|
|
|
Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER:
This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012
|
|
|
The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER:
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
|
|
|
Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER:
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011
|
|
|
Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER:
As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011
|
|
|
Virus Bulletin: Comparative Reviews August-December 2010
sponsored by ESET
WHITE PAPER:
Read this paper to view the latest news and information about VB100 testing, Windows Vista, Windows 7, Windows Server 2003, Windows 7 Professional, and so much more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010
|
|
|
The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER:
This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010
|
|