ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity

    Sponsored by: Information Security Magazine

    The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

  • Data Protection Solutions at Midsize Organizations

    Sponsored by: Trend Micro, Inc.

    In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.

  • Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management

    Sponsored by: eEye Digital Security

    In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.

  • ForwardView: Four Areas of Security Vital to Business Health

    Sponsored by: IBM

    Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  • Successfully Mitigating Corporate Risk

    Sponsored by: AT&T Corp

    This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.

  • BeyondTrust 2009 Microsoft Vulnerability Analysis

    Sponsored by: BeyondTrust Corporation

    This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.

  • Beating Web Application Security Threats

    Sponsored by: Thawte Inc.

    The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.

  • Smart Techniques for Application Security: Whitebox + Blackbox Security Testing

    Sponsored by: IBM

    Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • E-Book: Protecting Against Web Threats

    Sponsored by: TechTarget Security

    Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Sponsored by: TechTarget Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network

    Sponsored by: Code Green Networks, Inc.

    Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.

  • When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints

    Sponsored by: Sunbelt Software

    Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • The Top Five Virtualization Mistakes

    Sponsored by: Vyatta Inc.

    This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  • Cisco Continuous Data Protection for Files

    Sponsored by: Cisco Systems, Inc.

    Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.

  • Lumension Vulnerability Scanner Offer

    Sponsored by: Lumension

    This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: IBM

    This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • Understanding Web Application Security Challenges

    Sponsored by: IBM

    This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.

  • Support PCI Security Compliance with Enhanced Solutions from IBM

    Sponsored by: IBM

    This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.