Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER:
Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
Posted: 16 Mar 2021 | Published: 16 Mar 2021
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER:
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER:
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER:
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009
|
|
|
Small Business Networking: The Basics
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business networking begins with a secure, reliable, fast data network foundation. This paper fleshes out 7 ways small business networking can transform your company.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER:
Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009
|
|
|
Cisco IT GRC Security Assessment Service
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
Posted: 15 Jun 2009 | Published: 12 Jun 2009
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|