SANS – Survey on Application Security Programs
How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices. Download this report to see how mature and effective these programs are as well as what tools they use and how they justify budget.
SANS – Securing Web Applications Made Simple and Scalable
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers also limit the effectiveness of application
Know the Big Three
How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Designing a Defense For Mobile Apps
Mobile apps may be a threat, but they don’t have to be. Download this whitepaper to review the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
HP Global 2000 Mobile Risk Report
Mobile applications represent a growing threat to the enterprise. But how big of a threat? HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out. Download this report to see the alarming realities regarding the sheer number of applications vulnerable
Mapping Security for Your Virtual Environment
Is management of a virtualized environment a major concern? Does your business need a technology that helps you secure your virtual environments? With the growing popularity of virtualization in enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security
Not Your Father’s IPS: SANS Survey on Network Security Results
With cyber crime on the rise, many organizations rely on intrusion prevention systems (IPS) to detect and stop attacks. But to counter increasingly sophisticated threats, IPS is evolving into next-generation IPS (NGIPS). What drives the need for these new systems? And how are they different from earlier IPS? This study details a survey of 439
Next Generation Enterprise Network Security Solutions: The Importanace of Incorporating Vulnerability Intelligence
Hackers are quick to exploit newly discovered vulnerabilities in the software enterprises deploy and use. Traditional security defenses rely on known attack signatures, so they often fail to detect attacks that exploit new vulnerabilities. HP TippingPoint Next-Generation Intrusion Prevention System (NGIPS) and Next-Generation Firewall (NGFW) combine technology that focuses on the root problems common to
Defending Against Increasingly Sophisticated Cyber Attacks
Traditional intrusion prevention systems (IPS) fall short in detecting today’s advanced persistent threat (APT) cyber attacks. Next-generation intrusion prevention systems (NGIPS)—like HP Tipping Point NGIPS—go beyond IPS by gaining greater contextual awareness and applying it to attack detection. This study of APTs compares the features of IPS and NGIPS. It presents factors to consider when
2013 Cost of Cyber Crime Study: Global Report
According to the Ponemon Institute’s 2013 Cost of Cyber Crime study, the average cost to businesses of cyber crime is more than $7M per year—a 30% increase over last year. And the average number of attacks per company grew 20% to 73 successful attacks annually. With the incidence and cost of cyber crime rising sharply,