Research Library

Powered by

Security Threats Research

  • Secure Coding Practices: Avoid OS Command Injection Attacks

    Sponsored by: Whitehat Securities

    Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.

  • A WhiteHat Sentinel Product Family Overview

    Sponsored by: Whitehat Securities

    Read this white paper to learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis To ensure your apps are safe, no matter where they live.

  • Innovation Insight for Security Orchestration, Automation and Response

    Sponsored by: ServiceNow

    This Gartner report details the best security orchestration, automation and response tools to help improve security operations efficiency, quality and efficacy for your organization.

  • Getting Started with Secure DevOps

    Sponsored by: Veracode, Inc.

    Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.

  • The Essential Guide to Securing Remote Access

    Sponsored by: Duo Security

    New threats center on gaining remote access to your apps and data – whether it's with stolen passwords or exploited known vulnerabilities targeting out-of-date devices. Access this resource to uncover the different threats, using real-world examples, and uncover security best practices to help your organization maintain secure remote access.

  • The ROI of AppSec: Getting your Money's Worth from your AppSec Program

    Sponsored by: Veracode, Inc.

    Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.

  • Updates: The next evolution of operating systems

    Sponsored by:

    In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.

  • Market Guide for Mobile Threat Defense Solutions

    Sponsored by: Lookout

    Download this market guide for mobile threat defense solutions to discover how they can protect your organization at the device, network and application level and compare vendors in the space.

  • Aziz Bank of Afghanistan Reduces the Risk of Cyber Threats Using Seqrite Endpoint Security

    Sponsored by: Seqrite

    Many customers rely on the Azizi Bank's online portal for service requests, but low internet bandwidth was affecting the bank's operation and business behavior. Inside this case study, learn how this bank achieved security through endpoint and firewall protection to monitor and control web traffic.

  • The Security Professional's Role in a DevSecOps World

    Sponsored by: Veracode, Inc.

    Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.

  • Finding GDPR noncompliance in a mobile first world

    Sponsored by: Lookout

    With the proliferation of mobile devices in the workplace, whether company or employee owned, there is a greater risk of data loss or leakage. Whether they know it or not, your employees are putting your company's data--and GDPR compliance--at risk. This white paper is your guide to laying out the mobile portion of your GDPR strategy.

  • Worldwide Mobile Threat Management Security Software Vendor Assessment

    Sponsored by: Lookout

    The mobile security market is expanding and you need to know how to evaluate the different vendors. This IDC report discusses how you can go about your own evaluation process and breaks down one of the leading vendors as an example.

  • The Building Security in Maturity Model Examined

    Sponsored by: Synopsys

    In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.

  • The Business Case for Mobile Security

    Sponsored by: Lookout

    Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.

  • State of Software Security

    Sponsored by: Veracode, Inc.

    According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.

  • How to Create, Deploy, and Operate Secure IoT Applications

    Sponsored by: Telit

    According to Gartner, spending on IoT security is expected to reach $547 million in 2018. In this white paper, gain valuable insights on how to create, deploy and operate end-to-end security to help identify and prevent hackers from getting your organizations data through IoT devices.

  • How to Create a Scalable Threat Model

    Sponsored by: Synopsys

    Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.

  • Bitcoin Blackmailing Leads Mishi to Alibaba Cloud for WAF Protection

    Sponsored by: Alibaba Cloud

    In this case study, learn how Alibaba Cloud was able to protect the Australian food delivery app Mishi from future cyberattacks without disrupting their online platform.

  • Case Study: How to Secure Endpoints even at Low Internet Bandwidth

    Sponsored by: Seqrite

    With the evolving complexities and volume of threats, Posco wanted a one-stop security tool that could help secure their network even at low Internet bandwidth. Learn about why Posco choose an endpoint security tool to overcome this challenge.

  • Security Comparison: MDR, MSSP, and SIEM

    Sponsored by: Arctic Wolf Networks, Inc.

    Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.

  • The 5-Minute Companion for the Cyber-Conscious Employee

    Sponsored by: Arctic Wolf Networks, Inc.

    Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.

  • How to update, automate your IR processes

    Sponsored by: Booz Allen Hamilton

    In the era of nonstop security threats, creating a cyber threat intelligence team and leveraging incident response (IR) tools can help with detection and automation of processes. Explore the tools and considerations for updating your IR processes.

  • How SMBs are Changing their Security Tactics

    Sponsored by: Booz Allen Hamilton

    Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.

  • Unified Threat Management: A Modern Solution to a Modern Problem

    Sponsored by: Seqrite

    Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.

  • Protecting Your Enterprise from Ransomware Attacks

    Sponsored by: Seqrite

    Click inside to take a more in-depth look at what makes a ransomware attack unique, and why you need to take steps to protect yourself. Then, learn about 5 protection mechanisms you can put into place.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.