Built-in Self-test (BIST) Using Boundary Scan
By: Texas Instruments, Inc. View more from Texas Instruments, Inc. >>
Download this next:
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this 15-page buyer’s guide, Computer Weekly looks at:
- The expansion of boundaries of the digital workplace and the steps enterprises can take to implement a secure perimeterless digital workplace
- Security without boarders and a way of securing each point of connectivity and every device
- The break free from traditional network security and the assessment of how corporate networks are breaking out of their boundaries
These are also closely related to: "Built-in Self-test (BIST) Using Boundary Scan"
-
What to Expect from Gigabit Wireless LAN
By: Aerohive Networks
Type: eGuide
With 802.11n deployment well under way, enterprises are beginning to eye gigabit wireless LAN. IEEE standards 802.11ac and 802.11ad both aim to provide gigabit speed wireless LAN in different channels, but what can you really expect?
This e-guide, presented by SearchNetworking.com, provides an in depth look at gigabit wireless LAN and uncovers the truth about 802.11ac and throughput, while discussing what engineers can expect in the future.
-
AI & the future of procurement
By: GEP
Type: White Paper
With its capacity to transcend the boundaries of software, the significance of AI in procurement and supply chain technology is undeniable.
But why should procurement and supply chain professionals adopt an AI-centric approach?
Download this white paper to unlock 5 difference-making capabilities of AI that make it a necessity for the future of procurement:
- Adeptness
- Agility
- Attention
- And 2 more
Find more content like what you just read:
-
A Computer Weekly eGuide to Workspaces
By: TechTarget ComputerWeekly.com
Type: eGuide
In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
-
Stopping ransomware: 2024 tips
By: SecurityHQ
Type: White Paper
In this white paper, discover 40 simple and inexpensive actions you can take to stop ransomware attacks.
-
SAST vs. DAST: What Are the Differences and Why Are They Both Important?
By: Veracode, Inc.
Type: Resource
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
Your walkthrough of Boundary: Automatically discover target hosts on Azure
By: Microsoft + HashiCorp
Type: Webcast
Tune in to this exclusive webcast as experts from HashiCorp discuss how using Boundary to access dynamically created Azure resources can help your organization eliminate the need to manually configure targets for dynamic, cloud-based infrastructure.
-
Security outcomes for Zero Trust: Adoption, access, and automation trends
By: Cisco
Type: White Paper
Zero-trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer exist. Learn about some secrets to success in this Cisco white paper.
-
Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
-
How InterSystems supports revolutionary cancer screening tech
By: InterSystems
Type: Case Study
eNose is a revolutionary new technology that screens for diseases by testing a patient’s exhaled breath. It offers effective screening for cancers and infectious diseases, including lung cancers that cannot even be detected in CT scans. Learn how partnering with InterSystems helped make it all possible in this video.
-
Why you should have a disaster recovery testing plan in place
By: TechTarget ComputerWeekly.com
Type: eGuide
With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.
-
The Many Faces of Software Testing
By: TechTarget Security
Type: eGuide
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
-
Proving ownership of IPv6 addresses
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
The application security solution checklist: What you need to know
By: HCL Software
Type: eBook
Download this e-book for your exclusive guide to procuring an application security testing partner, including gaining an understanding of use cases, critical technologies, and best practices.
-
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
The term "integration test" means different things to different people. Integration testing can be challenging for all companies, no matter what the meaning. In this Solution Spotlight, readers will learn tips and best practices around Integration testing, as well as challenges they may face and how to avoid issues.
-
E-Guide: Expert insights to application security testing and performance
By: TechTarget Security
Type: eGuide
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
Royal Holloway: Testing antivirus efficacy in Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
E-Guide: Best practices for pen testing Web applications
By: TechTarget Security
Type: eGuide
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
-
What does “continuous scanning” really mean?
By: Crytica Security, Inc.
Type: White Paper
While numerous cybersecurity vendors have applied the term “continuous scanning” freely to convey the speed at which their MDR, EDR, XDR product offerings operate, in reality, many of these product offerings fall short of deserving a “continuous” classification. Discover what it takes to truly achieve continuous scanning in this white paper.
-
6 key criteria for developer-first secrets scanning solutions
By: Palo Alto Networks
Type: White Paper
Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.
-
School district strengthens security and connectivity
By: Fortinet, Inc.
Type: Case Study
FortiSASE delivered a 50% reduction in operations for Upper Grand District School Board, enabling secure remote access for 40K students and staff.
-
Augmenting Cybersecurity Defenses With Managed Services
By: LRS IT Solutions
Type: Product Overview
With the cyber landscape brimming with threats, your organization may require some help augmenting your defenses. In this overview, learn about managed services for SIEM, vulnerability scanning and much more.
-
E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
By: TechTarget Data Center
Type: eBook
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
-
Pipeline-native scanning for modern application development
By: Contrast Security
Type: White Paper
Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
-
What a vulnerability & patch management service can provide
By: Novacoast
Type: Product Overview
Download this overview to learn about maturing your security program by leveraging a vulnerability and patch management service.
-
QR code phishing on the rise: How to protect yourself
By: Cofense
Type: Blog
QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.
-
The ever-increasing necessity: File upload security
By: Deep Instinct
Type: White Paper
Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
-
What should you ask a pentesting service provider?
By: Trustwave
Type: White Paper
To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.
-
Royal Holloway: Man proposes, fraud disposes
By: TechTarget ComputerWeekly.com
Type: Research Content
In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
-
Test-integrated module publishing 101: What to know
By: Microsoft + HashiCorp
Type: Product Demo
Today, developers are looking for new, easy-to-use tools to perform unit and integration testing of code. However, to benefit from high-quality modules, companies must also have an effective way of publishing them systematically. Tune into this video to learn more.
-
-
How to expand app security testing coverage without slowing development
By: HCL Software
Type: Case Study
Discover in this case study how HCL Tech is helping organizations implement Interactive Application Security Testing solutions, which can help businesses expand and improve security testing without slowing down application software development.
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
Buyer’s guide to evaluating SASE clouds
By: Netskope
Type: Analyst Report
Broadband-Testing is an independent testing operation which provides vendor-neutral evaluations of tech solutions. This report presents a scorecard for comparing SASE clouds and acts as a first step in the vendor evaluation process. Read on to learn more.
-
-
QA automation: Consistently deliver high-quality software
By: Growth Acceleration Partners
Type: eBook
QA services and software testing solutions are crucial aspects of the software development lifecycle. A focus on this specialized process ensures software meets specified requirements, functions correctly, and delivers a positive user experience. Read on to understand why QA automation testing is key for delivering high-quality software.
-
Penetration testing: Different types & how it works
By: Bitdefender
Type: White Paper
Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
-
7 advantages of a SaaS-based application security program
By: Veracode, Inc.
Type: Resource
In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
Next Generation Network Management Techniques
By: TechTarget Security
Type: Ezine
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
Application Security Handbook: Application Security: Managing Software Threats
By: TechTarget Security
Type: eBook
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.
-
A thousand pen-testers, at your service
By: Pcysys
Type: Data Sheet
Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.
-
IAST fact vs. fiction: Debunking 5 common myths
By: Contrast Security
Type: Blog
While Interactive Application Security Testing (IAST) can help accelerate DevSecOps, some common misconceptions persist that can stymie even the most valiant of security testing efforts. This essential resource debunks 5 commonly-believed IAST myths.
-
How to protect your customers with communication APIs
By: 8x8, Inc.
Type: White Paper
How are cybercriminals getting your customer data? And how can you stop them? Access this white paper to learn how you can leverage an automated scanning and monitoring system that identifies, highlights, and weeds out threats before they infiltrate systems to power better customer experiences.
-
Build and deploy quality ML models with AI observability
By: AWS & Intel
Type: Case Study
In this case study, you’ll discover how a leading bank was able to reliably speed up ML model testing, approval, and deployment by leveraging a comprehensive AI observability solution. Read on to learn how you can ensure model quality for your AI solutions by focusing on testing and monitoring throughout the software lifecycle.
-
SAST vs. IAST: Picking the Right Tool for the Job
By: Contrast Security
Type: Webcast
Watch this webinar for a demo of static application security testing (SAST) and interactive application security testing (IAST) solutions and determine which is the right tool for your needs.