IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Red Teaming

RSS Feed    Add to Google    Add to My Yahoo!
Red TeamingReports
 
IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER: This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007

Fortify Software

How to Successfully Automate the Functional Testing Process
sponsored by Borland Software Corporation
WHITE PAPER: This white paper provides practical insight into the lessons learned by those who have successfully automated the functional testing process.
Posted: 24 May 2006 | Published: 01 May 2006

Borland Software Corporation

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement