This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines