Vulnerability Management White Papers
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
Application security: best practices and risks
Sponsored by: TechTarget ComputerWeekly.comSecurity professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
Sponsored by: Sunbelt SoftwareEndpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
-
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
Sponsored by: SonicWALLThis brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
-
The Top Five Virtualization Mistakes
Sponsored by: Vyatta Inc.This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
-
Essential Guide to Threat Management
Sponsored by: Information Security MagazineCheck out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
-
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
Sponsored by: IBMCheck out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
-
Protection on demand: information security that works for you - instead of putting you to work.
Sponsored by: IBMCheck out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
eBook: Software as a Service: What You Should Consider When Moving to SaaS
Sponsored by: TechTarget SecurityCheck out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
-
7 Essential Steps of Network Security
Sponsored by: QualysThis paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
-
The IBM Rational AppScan Lifecycle Solution
Sponsored by: IBMIBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
-
Protecting Credit Card Data: How to Achieve PCI Compliance
Sponsored by: Motorola SolutionsThis white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
Meeting the Payment Card Industry Data Security Standard
Sponsored by: Prism Microsystems Inc.Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
-
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
Sponsored by: Qualys, Inc.The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
Sponsored by: Qualys, Inc.CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
-
Vulnerability Management for GLBA Compliance
Sponsored by: Qualys, Inc.The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
-
The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
Sponsored by: Coverity by SynopsysThis white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
-
Controlling Software Complexity: The Business Case for Static Source Code Analysis
Sponsored by: Coverity by SynopsysThis white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
-
Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis
Sponsored by: Coverity by SynopsysThis paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle.
-
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
Sponsored by: LumensionBooz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.