TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How Static Analysis Protects Critical Infrastructure from Cyber Threats

by GrammaTechMay 23, 2018

This paper will help developers of embedded and IoT systems learn how to build-in security and safeguards that are resistant to human error, natural disaster, and cyber attacks.

  • GrammaTech
  • Endpoint Security
  • Security
  • Details

Prevent Cybercrime and Insider Attacks In Your Company with Static Analysis

by GrammaTechMay 23, 2018

In this report, GrammaTech explains how cybercrime inside a company works and shares examples of potential backdoors.

  • GrammaTech
  • Endpoint Security
  • Security
  • Details

Protecting Against Tainted Data in Embedded Apps with Static Analysis

by GrammaTechMay 23, 2018

This paper describes how a static analysis technique called taint analysis can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code.

  • GrammaTech
  • Endpoint Security
  • Security
  • Details

Simplifying DO-178B/C Compliance with Grammatech’s CodesSonar

by GrammaTechMay 23, 2018

This paper describes how GrammaTech's CodeSonar can be used to support an organization's DO-178B activities.

  • GrammaTech
  • Endpoint Security
  • Security
  • Details

The Role of Static Analysis in Management of Cybersecurity in Medical Devices

by GrammaTechMay 23, 2018

This paper describes how static analysis plays a key role in risk management of medical device software development.

  • GrammaTech
  • Endpoint Security
  • Security
  • Details

Choosing a cybersecurity solution – 11 key points to consider

by ibossMay 22, 2018

Choosing the right cybersecurity solution is challenging. You need to protect your organization from increasingly sophisticated threats, but you don't want to consume valuable IT resources with complex management and reporting requirements. In a crowded vendor landscape, how do you find the most effective security for your organization?

  • iboss
  • Cloud Security
  • Cybersecurity
  • Details

Why Next-Generation Firewalls Aren’t an All-Encompassing Solution

by ibossMay 22, 2018

As the cybersecurity threat landscape evolved over the past 20-plus years, the firewalls originally employed by IT the world over grew increasingly ineffective at blocking bad actors from accessing network data. Next-generation firewalls (NGFWs) aims to fill those gaps, but do they really provide an all-encompassing solution for network security? And how do they differ from secure web gateways (SWGs) in their ability to evaluate data entering and leaving the network?

  • iboss
  • Cloud Security
  • Cybersecurity
  • Details

RFP Guide: 6 Must Include Topics

by ibossMay 22, 2018

Changing technology vendors is an important process. But, understanding the details is critical to ensure your organization is making the best decision - especially when it comes to secure web gateways, the first and last line of defense for your network. Given the gateway's mission-critical nature and the evolving security landscape, there are a handful of questions everyone should be asking their potential secure web gateway solution vendors. Read this whitepaper to learn the six must-include

  • iboss
  • Cloud Security
  • Security
  • Details

Discover Hidden Credentials and Harden Your Network

by Illusive NetworksMay 16, 2018

Normal data-sharing and application use causes can create an attacker-friendly environment. Learn how you can improve cyber hygiene to reduce risks associated with targeted attacks.

  • Illusive Networks
  • Security
  • Network & Perimeter Security
  • Details

Ironclad APIs: An Approach for Application Security Testing

by WhiteHat SecurityMay 15, 2018

If you're not testing your APIs, you're making a big mistake. APIs are fast becoming the standard base for software development. Yet testing is often overlooked even though API code is extremely vulnerable to even the simplest of attacks. Download this whitepaper for:
• A brief overview of APIs
• Common API security vulnerabilities
• Best practices for properly testing your mission-critical APIs

  • Whitehat Security
  • Security Monitoring
  • Security Management & Analytics
  • Details