ComputerWeekly.com Research Library

Powered by Bitpipe.com

Penetration Testing Research

  • The Buyer's Guide To Penetration Testing

    Sponsored by: Synack

    From scanners and traditional pen tests to bug bounty programs, and platform-based security tests – there's a lot of jargon and variation out there. Cut through the confusion and choose what's best for you. Download the Buyer's Guide to Penetration Testing to learn more.

  • BlackBerry MITRE ATTACK APT29 Evaluation

    Sponsored by: BlackBerry

    In conjunction with the framework, MITRE ATT&CK also conducts security evaluations without commentary or bias – the purpose is to provide objective information regarding how vendors fare against certain threat techniques. Download this report for BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data.

  • The Business Case for Cysiv SOC-as-a-Service

    Sponsored by: Cysiv

    Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • ITProTV | CompTIA PenTest+: Analyze Scripts: Python

    Sponsored by: Cornerstone OnDemand

    This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.

  • The Synack Value

    Sponsored by: Synack

    As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.

  • Lessons from the Field: How are Skilled Testers Infiltrating?

    Sponsored by: Dell SecureWorks

    In this webcast, hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

  • Bluetooth Low Energy: The IoT battle

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

  • IT Security Salary Index (UK)

    Sponsored by: ComputerWeekly.com

    Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.

  • E-Guide: VM in the Cloud

    Sponsored by: SearchSecurity.com

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: SearchSecurity.com

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • Essential Guide to Threat Management

    Sponsored by: SearchSecurity.com

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

  • Save Your Future Self With Security Now

    Sponsored by: SearchSoftwareQuality.com

    Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.

  • Putting Security on Auto-Pilot: What Works, What Doesn't

    Sponsored by: SearchSecurity.com

    This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: ESET

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • Magic Quadrant for Static Application Security Testing

    Sponsored by: Veracode, Inc.

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Lumension Vulnerability Scanner Offer

    Sponsored by: Lumension

    This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: Logicalis

    This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • eBook: Software as a Service: What You Should Consider When Moving to SaaS

    Sponsored by: SearchSecurity.com

    Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

  • Acquire a global view of your organization's security state: the importance of security assessments

    Sponsored by: IBM Software Group

    Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.