How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER:
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009
|
|
|
Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER:
This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009
|
|
|
Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER:
This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER:
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Quicktour Demo: Key Differentiators between Microstrategy and Business Objects
sponsored by MicroStrategy
WHITE PAPER:
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Business Objects.
Posted: 26 Nov 2008 | Published: 26 Nov 2008
|
|
|
Move Web Application Security Testing into Your Development Cycle
sponsored by IBM
WHITE PAPER:
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
Posted: 06 Oct 2008 | Published: 04 Oct 2008
|
|
|
Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development.
sponsored by IBM
WHITE PAPER:
This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment.
Posted: 06 Oct 2008 | Published: 04 Oct 2008
|
|
|
WebSphere Application Server Feature Pack for Web 2.0
sponsored by IBM
WHITE PAPER:
This white paper explores methods for improving the development of Ajax-based applications and Web 2.0 to SOA connectivity.
Posted: 10 Jun 2008 | Published: 10 Jun 2008
|
|
|
Importance of Web Application Firewall Technology for Protecting Web-based Resources
sponsored by Imperva
WHITE PAPER:
ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
Posted: 02 Apr 2008 | Published: 10 Jan 2008
|
|
|
Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER:
This white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007
|
|
|
Oracle Application Express Tutorial
sponsored by Oracle Corporation
WHITE PAPER:
Follow this step-by-step tutorial to create secure web applications that run inside your database using Oracle Application Express. You'll quickly learn how to easily build secure web forms, reports and charts.
Posted: 04 Dec 2006 | Published: 04 Dec 2006
|
|
|
Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER:
Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006
|
|