The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016
|
|
|
Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER:
SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016
|
|
|
Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER:
Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006
|
|
|
Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER:
In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013
|
|
|
Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER:
Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012
|
|
|
Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE:
Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007
|
|
|
Anti-Spyware: Choosing the Right Solution for Your Business
sponsored by Intel Security
WHITE PAPER:
Spyware is rapidly becoming the number one threat to business systems and can destructively burden them if left undetected. Read this white paper to learn how an anti-spyware solution can meet your business requirements while securing your system.
Posted: 27 Mar 2007 | Published: 01 Oct 2005
|
|
|
Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT:
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011
|
|
|
HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014
|
|
|
Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK:
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010
|
|
|
|
|