ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: TechTarget Security

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    Sponsored by: TechTarget Security

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

  • The N-able MSP Sales & Marketing Digital Binder

    Sponsored by: Solarwinds N-able

    This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.

  • E-Guide: Exploring Configuration Changes to Reduce Attacks

    Sponsored by: Tripwire, Inc.

    Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.

  • A Whirlwind Tour of Wireless Vulnerabilities

    Sponsored by: AirMagnet

    This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.

  • Presentation Transcript: Vulnerability Scanning and Compliance

    Sponsored by: Dell SecureWorks

    In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.

  • Assess Virtualization Security Risk in Six Simple Steps

    Sponsored by: Intel

    There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together.

  • Musings on the PSN Attack Vector

    Sponsored by: Veracode, Inc.

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • Presentation Transcript: Patch Management for the IT Infrastructure

    Sponsored by: GFI Software

    Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.

  • E-Guide: Best practices: Effective Data Protection

    Sponsored by: IBM

    This e-guide will walk you through data protection strategy and how to protect your business critical assets. Continue reading to learn best practices for effective data protection.

  • E-Guide: Risk Management and Compliance Enforcement for the Financial Industry

    Sponsored by: IBM

    This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.

  • How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g

    Sponsored by: Miro Consulting, Inc.

    Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).

  • Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security

    Sponsored by: Trend Micro, Inc.

    An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.

  • Help Strengthen Security by Building a Trusted Identity Environment

    Sponsored by: IBM

    As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.

  • Presentation Transcript: What’s New with Rational Application Security?

    Sponsored by: IBM

    Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats.

  • Virus Bulletin: Comparative Reviews August-December 2010

    Sponsored by: ESET

    Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  • E-Book: Technical Guide on Application Security: Scanning Production Applications

    Sponsored by: IBM

    This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications.

  • Presentation Transcript: Path to a Secure Application

    Sponsored by: IBM

    This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.

  • E-Guide: Best Practices for Developing Secure Applications

    Sponsored by: IBM

    This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.

  • Lumension Endpoint Management and Security Suite

    Sponsored by: Lumension

    A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  • The Right Tool for the Right Job: An Application Security Tools Report Card

    Sponsored by: IBM

    This white paper examines the most common tools found in the enterprise application security environment.

  • Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

    Sponsored by: Wave Systems Corp.

    Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.

  • The Anatomy of a Cross-Site Scripting Campaign

    Sponsored by: Imperva

    XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

  • Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    Sponsored by: VeriSign Australia

    This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.