ComputerWeekly.com Research Library

Powered by Bitpipe.com

Penetration Testing White Papers

  • Applying Machine Learning to Outstanding Network Asset Detection

    Sponsored by: Delve

    In this white paper, learn about the concept of “Gold Nuggeting,” or how to dig for outstanding network devices using machine learning.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • Essential Elements of a Penetration Test

    Sponsored by: Synack

    A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.

  • Hack the Pentagon Case Study

    Sponsored by: Synack

    The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.

  • The Synack Value

    Sponsored by: Synack

    As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.

  • Crowdsourced Security Testing Overview

    Sponsored by: Synack

    Crowdsourced penetration testing has shown to provide organizations with in-depth, actionable insights. However, scaling that crowd requires machine intelligence. In this solution brief, take a closer look at Synack’s Crowdsourced Security Testing, designed to combine artificial and human intelligence into one penetration testing platform.

  • Evaluating a Penetration Testing Company

    Sponsored by: InteliSecure

    Regardless of your company’s reasons for requiring pen testing, a primary factor in your test’s success is picking a provider who is capable of meeting your company’s specific goals. So where do you start? Use this 3-step guide to define your selection process and narrow down your choices.

  • Bluetooth Low Energy: The IoT battle

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.

  • IT Security Salary Index (UK)

    Sponsored by: ComputerWeekly.com

    Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.

  • E-Guide: VM in the Cloud

    Sponsored by: SearchSecurity.com

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: SearchSecurity.com

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • Essential Guide to Threat Management

    Sponsored by: SearchSecurity.com

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

  • Save Your Future Self With Security Now

    Sponsored by: SearchSoftwareQuality.com

    Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.

  • Putting Security on Auto-Pilot: What Works, What Doesn't

    Sponsored by: SearchSecurity.com

    This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • An Expert Guide to the PCI DSS 3.0

    Sponsored by: SearchSecurity.com

    This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: ESET

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • Magic Quadrant for Static Application Security Testing

    Sponsored by: Veracode, Inc.

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Lumension Vulnerability Scanner Offer

    Sponsored by: Lumension

    This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: Logicalis

    This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • eBook: Software as a Service: What You Should Consider When Moving to SaaS

    Sponsored by: SearchSecurity.com

    Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

  • Acquire a global view of your organization's security state: the importance of security assessments

    Sponsored by: IBM Software Group

    Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.