ComputerWeekly.com Research Library

Powered by Bitpipe.com

Penetration Testing Research

  • Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset

    Sponsored by: IBM

    The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.

  • Evaluating a Penetration Testing Company

    Sponsored by: InteliSecure

    Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.

  • Bluetooth Low Energy: The IoT battle

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

  • IT Security Salary Index (UK)

    Sponsored by: ComputerWeekly.com

    Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.

  • Outsourcing the problem of software security

    Sponsored by: ComputerWeekly.com

    This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.

  • E-Guide: VM in the Cloud

    Sponsored by: SearchSecurity.com

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: SearchSecurity.com

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • Essential Guide to Threat Management

    Sponsored by: SearchSecurity.com

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

  • Save Your Future Self With Security Now

    Sponsored by: SearchSoftwareQuality.com

    Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.

  • Putting Security on Auto-Pilot: What Works, What Doesn't

    Sponsored by: SearchSecurity.com

    This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: ESET

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • Magic Quadrant for Static Application Security Testing

    Sponsored by: Veracode, Inc.

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Lumension Vulnerability Scanner Offer

    Sponsored by: Lumension

    This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: Logicalis

    This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • eBook: Software as a Service: What You Should Consider When Moving to SaaS

    Sponsored by: SearchSecurity.com

    Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

  • Acquire a global view of your organization's security state: the importance of security assessments

    Sponsored by: IBM Software Group

    Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.

  • The importance of security assessments

    Sponsored by: IBM

    This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.

  • The Case for Application Security: How Real Is the Threat and What Are Your Options

    Sponsored by: Fortify Software

    This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.