Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019
|
|
|
VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019
|
|
|
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER:
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE:
This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009
|
|
|
The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007
|
|
|
Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK:
Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009
|
|
|
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
sponsored by IBM
PRESS RELEASE:
Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER:
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER:
Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Video - Vulnerability Management in a Web 2.0 World
sponsored by Lumension
VIDEOCAST:
Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Posted: 28 Jan 2009 | Premiered: Jan 28, 2009
|
|
|
eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK:
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER:
This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008
|
|
|
The IBM Rational AppScan Lifecycle Solution
sponsored by IBM
BROCHURE:
IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
Posted: 29 Jul 2008 | Published: 01 Jan 2007
|
|
|
Trial download: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE:
Download this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.
Posted: 29 Jul 2008 | Premiered: 29 Jul 2008
|
|
|
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER:
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008
|
|
|
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST:
Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)
|
|
|
Meeting the Payment Card Industry Data Security Standard
sponsored by Prism Microsystems Inc.
WHITE PAPER:
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
Posted: 30 May 2008 | Published: 08 Apr 2008
|
|
|
EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
sponsored by Qualys, Inc.
CASE STUDY:
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
Posted: 10 May 2008 | Published: 10 May 2008
|
|
|
Oracle Global IT (GIT) Streamlined Security
sponsored by Qualys, Inc.
CASE STUDY:
With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
Posted: 10 May 2008 | Published: 01 Apr 2007
|
|
|
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
sponsored by Qualys, Inc.
CASE STUDY:
CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
Posted: 10 May 2008 | Published: 01 Nov 2006
|
|
|
Vulnerability Management for GLBA Compliance
sponsored by Qualys, Inc.
PRODUCT LITERATURE:
The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
Posted: 10 May 2008 | Published: 01 Feb 2007
|
|
|
Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis
sponsored by Coverity by Synopsys
WHITE PAPER:
This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle.
Posted: 05 Mar 2008 | Published: 03 Mar 2008
|
|