Vulnerability Management Reports

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
sponsored by Lumension
CASE STUDY: Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Posted: 07 Feb 2008 | Published: 01 Jan 2007

Lumension

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

Case Studies with Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper for an analysis of early testing for Intel vPro processor technology in IT departments. See real-world examples of how Intel vPro technology improves security due to the hardware based capabilities not possible with software a...
Posted: 21 Nov 2007 | Published: 21 Nov 2007

Intel Corporation

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER: This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007

Fortify Software

The High Stakes of Security: Protecting Your Brand
sponsored by IBM Software Group
WHITE PAPER: This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
Posted: 26 Jul 2007 | Published: 01 Dec 2006

IBM Software Group

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies