Security Vulnerabilities White Papers

(View All Report Types)
GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER: Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Code Green Networks, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Practitioner's Guide to Establishing an SOC
sponsored by AT&T Cybersecurity
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AT&T Cybersecurity

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER: This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Lumension