Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

software vulnerabilities

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
    
LockLizard
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications
    
Veracode
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management
    
Cenzic
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
    
VMware AirWatch
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure, infrastructure, network security
    
Qualys
Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data center
    
McAfee
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization, patch management, servers
    
Blue Lane
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.