Vulnerability Management Research
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
Application security: best practices and risks
Sponsored by: TechTarget ComputerWeekly.comSecurity professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
Sponsored by: Sunbelt SoftwareEndpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
-
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
Sponsored by: SonicWALLThis brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
-
The Top Five Virtualization Mistakes
Sponsored by: Vyatta Inc.This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
-
Essential Guide to Threat Management
Sponsored by: Information Security MagazineCheck out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
-
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
Sponsored by: IBMCheck out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
-
Protection on demand: information security that works for you - instead of putting you to work.
Sponsored by: IBMCheck out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
Video - Vulnerability Management in a Web 2.0 World
Sponsored by: LumensionLumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
-
eBook: Software as a Service: What You Should Consider When Moving to SaaS
Sponsored by: TechTarget SecurityCheck out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
-
7 Essential Steps of Network Security
Sponsored by: QualysThis paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
-
The IBM Rational AppScan Lifecycle Solution
Sponsored by: IBMIBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
-
Trial download: IBM Rational AppScan
Sponsored by: IBMDownload this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
2008 Verizon Business Data Breach Investigations Report
Sponsored by: Verizon BusinessCheck out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
-
Meeting the Payment Card Industry Data Security Standard
Sponsored by: Prism Microsystems Inc.Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
Sponsored by: Qualys, Inc.CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
-
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
Sponsored by: Qualys, Inc.The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
-
Vulnerability Management for GLBA Compliance
Sponsored by: Qualys, Inc.The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
-
Controlling Software Complexity: The Business Case for Static Source Code Analysis
Sponsored by: Coverity by SynopsysThis white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.