Application Security Reports

Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT: This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Klocwork

Securing the enterprise application layer: Expert Guidelines
sponsored by TechTarget Security
EGUIDE: If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

TechTarget Security

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development
sponsored by IBM
EGUIDE: Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Intel Cloud Builders Guide: Cloud Design and Development on Intel Platforms Trusted Computer Pools with Parellels
sponsored by Intel
WHITE PAPER: This white paper describes six key aspects of security and offers advice for addressing them in your cloud strategy.
Posted: 23 Aug 2011 | Published: 22 Aug 2011

Intel

Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Resilience Services for Business Continuity and Risk Management: Address Risks More Effectively with a Flexible Resilience Strategy
sponsored by IBM
DATA SHEET: The demand for continuous access to information and applications places increasing pressure on organizations to have an optimal business resilience program. This data sheet discusses how IBM can help you assess, plan, design, architect, implement and test your business continuity and resilience plans across the enterprise.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Taking Enterprise Application Integration Into The Cloud
sponsored by DellEMC and Intel®
WHITE PAPER: Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

DellEMC and Intel®

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

VMware vCloud API Abstraction
sponsored by Layer 7 Technologies
PRODUCT OVERVIEW: Cloud computing offers your organization efficiency, flexibility and scalability, but managing cloud-based applications can be extremely challenging. Access this resource for a detailed overview of Layer 7 Technologies' CloudControl gateway and learn how it can deliver protection, abstraction and metering for your cloud-based applications.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

Layer 7 Technologies

Managing data and application security risks cost effectively
sponsored by IBM
WHITE PAPER: This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
Posted: 01 Jul 2011 | Published: 01 Oct 2009

IBM

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
sponsored by TechTarget Security
EGUIDE: Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

TechTarget Security

Presentation Transcript: How Security is Well Suited for Agile Development
sponsored by IBM
PRESENTATION TRANSCRIPT: View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

IBM

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

The Future of Enterprise Computing: Preparing for the Compute Continuum
sponsored by Intel
WHITE PAPER: Server virtualization and the cloud are creating a future for enterprise computing in which access to information via a variety of devices from any location at any time will be mission-critical. Access this exclusive resource to help formulate a plan for a continuous end-user experience.
Posted: 13 Jun 2011 | Published: 01 May 2011

Intel

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Information Security Ezine- Europe
sponsored by TechTarget ComputerWeekly.com 
EZINE: This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

TechTarget ComputerWeekly.com 

E-Guide: Cloud computing security - Infrastructure issues
sponsored by TechTarget Security
EGUIDE: While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth
sponsored by IBM
EGUIDE: Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

VMware vShield: Secure your Cloud with Virtualization-aware Security
sponsored by VMware, Inc.
VIDEO: Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost.  Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
Posted: 20 May 2011 | Premiered: 20 May 2011

VMware, Inc.

VMware vCloud Director: Build Secure Private Clouds to Deliver Infrastructure as a Service
sponsored by VMware, Inc.
WHITE PAPER: By now, many organizations have taken advantage of the benefits cloud computing can provide. So how can you gain even more benefits from your cloud without sacrificing security or control? Learn about a private cloud platform that allows IT organizations to become cloud service providers for the business.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds
sponsored by IBM
WHITE PAPER: This article provides an introduction to IBM® WebSphere® CloudBurst™ and WebSphere Application Server Hypervisor Edition.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys

Presentation Transcript: Patch Management for the IT Infrastructure
sponsored by GFI Software
PRESENTATION TRANSCRIPT: Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

Presentation Transcript: Best Practices for Scheduled Security Update Cycle
sponsored by GFI Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software