Vulnerability Management Research
-
The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
Sponsored by: Coverity by SynopsysThis white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
-
Controlling Software Complexity: The Business Case for Static Source Code Analysis
Sponsored by: Coverity by SynopsysThis white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
-
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
Sponsored by: LumensionBooz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
-
Intel Centrino Pro and Intel vPro Processor Technology
Sponsored by: Intel CorporationLearn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
-
Case Studies with Intel vPro Processor Technology
Sponsored by: Intel CorporationRead this white paper for an analysis of early testing for Intel vPro processor technology in IT departments. See real-world examples of how Intel vPro technology improves security due to the hardware based capabilities not possible with software a...
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
-
The High Stakes of Security: Protecting Your Brand
Sponsored by: IBM Software GroupThis white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
-
A Pathway to PCI Compliance
Sponsored by: ImprivataThis white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
-
Automated Penetration Testing; Can IT Afford Not To?
Sponsored by: Core Security TechnologiesThis paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.