Vulnerability Assessments Research
-
Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
Sponsored by: Information Security MagazineThe industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
-
Data Protection Solutions at Midsize Organizations
Sponsored by: Trend Micro, Inc.In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
-
Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
Sponsored by: eEye Digital SecurityIn this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
-
ForwardView: Four Areas of Security Vital to Business Health
Sponsored by: IBMIdentifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
-
E-Book: Technical Guide on Vulnerability Management
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
-
Successfully Mitigating Corporate Risk
Sponsored by: AT&T CorpThis paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
-
BeyondTrust 2009 Microsoft Vulnerability Analysis
Sponsored by: BeyondTrust CorporationThis report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
-
Beating Web Application Security Threats
Sponsored by: Thawte Inc.The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
-
Smart Techniques for Application Security: Whitebox + Blackbox Security Testing
Sponsored by: IBMJoin us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
-
Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
Sponsored by: Information Security MagazineThis month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
-
CORE IMPACT Pro V10
Sponsored by: Core Security TechnologiesPlease join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
-
E-Book: Protecting Against Web Threats
Sponsored by: TechTarget SecuritySome organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
-
eGuide: Information Security - Buyer's Guide to Messaging Security
Sponsored by: TechTarget SecurityProtecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
-
Understanding Why Web Application Security is Critical to Business
Sponsored by: Sirius Computer SolutionsThis paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
-
Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
Sponsored by: Code Green Networks, Inc.Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
-
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
Sponsored by: Sunbelt SoftwareEndpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
The Top Five Virtualization Mistakes
Sponsored by: Vyatta Inc.This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThe Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
-
Cisco Continuous Data Protection for Files
Sponsored by: Cisco Systems, Inc.Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
-
Lumension Vulnerability Scanner Offer
Sponsored by: LumensionThis network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
-
Support PCI Security Compliance with Enhanced Solutions from IBM
Sponsored by: IBMThis white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: IBMThis paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Understanding Web Application Security Challenges
Sponsored by: IBMThis paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.