The Ten Best Practices for Secure Software Development
sponsored by ISC2
WHITE PAPER:
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.
Posted: 15 Dec 2010 | Published: 15 Dec 2010
|
|
|
Virus Bulletin: Comparative Reviews August-December 2010
sponsored by ESET
WHITE PAPER:
Read this paper to view the latest news and information about VB100 testing, Windows Vista, Windows 7, Windows Server 2003, Windows 7 Professional, and so much more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010
|
|
|
E-Book: Technical Guide on Application Security: Scanning Production Applications
sponsored by IBM
EBOOK:
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications.
Posted: 07 Dec 2010 | Published: 07 Dec 2010
|
|
|
The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST:
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010
|
|
|
Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT:
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010
|
|
|
Presentation Transcript: Making Time for Endpoint Security
sponsored by BigFix
PRESENTATION TRANSCRIPT:
This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.
Posted: 29 Nov 2010 | Published: 29 Nov 2010
|
|
|
E-Guide: Best Practices for Developing Secure Applications
sponsored by IBM
EGUIDE:
This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.
Posted: 10 Nov 2010 | Published: 10 Nov 2010
|
|
|
Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT:
In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010
|
|
|
TrendLabs: Global Threat Trends 1H 2010
sponsored by Trend Micro, Inc.
WHITE PAPER:
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world.
Posted: 22 Oct 2010 | Published: 22 Oct 2010
|
|
|
Lumension Endpoint Management and Security Suite
sponsored by Lumension
TRIAL SOFTWARE:
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010
|
|
|
Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE:
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010
|
|
|
ESET: Threat Center
sponsored by ESET
PRODUCT DEMO:
IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010
|
|
|
The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER:
This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010
|
|
|
Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST:
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010
|
|
|
The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER:
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010
|
|
|
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER:
This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010
|
|
|
Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE:
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010
|
|
|
Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER:
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010
|
|
|
Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER:
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008
|
|
|
Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER:
In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010
|
|
|
Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware
sponsored by Sophos
WHITE PAPER:
Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.
Posted: 25 Jun 2010 | Published: 24 Jun 2010
|
|
|
Top 5 Threat Protection Best Practices
sponsored by Sophos
ANALYST BRIEF:
Today’s corporate networks face a barrage of threats, from malware to accidental data loss. The endpoints receive the brunt of these attacks, and if they are not protected they can serve as a threat portal to the entire network. This paper offers advice to help you protect your endpoints and your network against an ever-growing body of threats.
Posted: 25 Jun 2010 | Published: 24 Jun 2010
|
|
|
ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER:
Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008
|
|
|
E-Book: Technical Guide on Vulnerability Management
sponsored by TechTarget Security
EBOOK:
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010
|
|
|
How to Let Staff Use Their Personal Technology Securely
sponsored by AVG Technologies USA, Inc.
WHITE PAPER:
Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely.
Posted: 28 Apr 2010 | Published: 28 Apr 2009
|
|