White Papers by Topic: Security

Resources available: 200

Advanced Persistent Threats: Detection, Protection and Prevention

In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks.

Mainstay ROI - Does Application Security Pay?

Does Application Security Pay? Actually, it does! Mainstay reviewed the Software Security Assurance solutions of 17 organizations and found financial benefits as high as $2.4M from efficiency and productivity improvements.

SANS - Survey on Application Security Programs

How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices. Download this report to learn more.

SANS - Securing Web Applications Made Simple and Scalable

Check out this whitepaper to learn how automated security testing can provide a simple and scalable way to protect your web applications.

Know the Big Three

How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.

Designing a defense for mobile apps

Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications.

Infographic: HP Global 2000 Mobile Risk Report

Download this info-graphic for an overview of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

HP Global 2000 Mobile Risk Report

Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

Protecting Digitalized Assets in Healthcare

Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.

©1994-2014 Infoworld, Inc.