Cyber Security Enhancement Act of 2002 White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

TOPICS:  Cybersecurity
Veracode, Inc.

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos

Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER: Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

A Dynamic, AI-powered Approach for Employee Growth and Development that Improves Retention
sponsored by ServiceNow
WHITE PAPER: Read this paper for data-driven strategies to help your organization close talent gaps and boost employee satisfaction that will increase employee retention.
Posted: 17 Nov 2023 | Published: 17 Nov 2023

TOPICS:  IT Management
ServiceNow

Supercharging Employee Growth and Development
sponsored by ServiceNow
WHITE PAPER: Business Leaders are finding that focusing on skills, rather than jobs or degrees, strengthens your workforce with modern data and insights. This paper presents four ways that a skills-powered approach can supercharge employee growth and development.
Posted: 06 Oct 2023 | Published: 06 Oct 2023

TOPICS:  IT Management
ServiceNow

Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER: In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Elevate the Employee Experience with ESG
sponsored by ServiceNow
WHITE PAPER: Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  IT Management
ServiceNow