Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


How Static Analysis Protects Critical Infrastructure from Cyber Threats

by GrammaTechMay 23, 2018

This paper will help developers of embedded and IoT systems learn how to build-in security and safeguards that are resistant to human error, natural disaster, and cyber attacks.

Prevent Cybercrime and Insider Attacks In Your Company with Static Analysis

by GrammaTechMay 23, 2018

In this report, GrammaTech explains how cybercrime inside a company works and shares examples of potential backdoors.

Protecting Against Tainted Data in Embedded Apps with Static Analysis

by GrammaTechMay 23, 2018

This paper describes how a static analysis technique called taint analysis can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code.

Simplifying DO-178B/C Compliance with Grammatech’s CodesSonar

by GrammaTechMay 23, 2018

This paper describes how GrammaTech's CodeSonar can be used to support an organization's DO-178B activities.

The Role of Static Analysis in Management of Cybersecurity in Medical Devices

by GrammaTechMay 23, 2018

This paper describes how static analysis plays a key role in risk management of medical device software development.

Choosing a cybersecurity solution – 11 key points to consider

by ibossMay 23, 2018

Choosing the right cybersecurity solution is challenging. You need to protect your organization from increasingly sophisticated threats, but you don't want to consume valuable IT resources with complex management and reporting requirements. In a crowded vendor landscape, how do you find the most effective security for your organization?

Why Next-Generation Firewalls Aren’t an All-Encompassing Solution

by ibossMay 23, 2018

As the cybersecurity threat landscape evolved over the past 20-plus years, the firewalls originally employed by IT the world over grew increasingly ineffective at blocking bad actors from accessing network data. Next-generation firewalls (NGFWs) aims to fill those gaps, but do they really provide an all-encompassing solution for network security? And how do they differ from secure web gateways (SWGs) in their ability to evaluate data entering and leaving the network?

RFP Guide: 6 Must Include Topics

by ibossMay 23, 2018

Changing technology vendors is an important process. But, understanding the details is critical to ensure your organization is making the best decision - especially when it comes to secure web gateways, the first and last line of defense for your network. Given the gateway's mission-critical nature and the evolving security landscape, there are a handful of questions everyone should be asking their potential secure web gateway solution vendors. Read this whitepaper to learn the six must-include

Discover Hidden Credentials and Harden Your Network

by Illusive NetworksMay 16, 2018

Normal data-sharing and application use causes can create an attacker-friendly environment. Learn how you can improve cyber hygiene to reduce risks associated with targeted attacks.

Ironclad APIs: An Approach for Application Security Testing

by WhiteHat SecurityMay 15, 2018

If you're not testing your APIs, you're making a big mistake. APIs are fast becoming the standard base for software development. Yet testing is often overlooked even though API code is extremely vulnerable to even the simplest of attacks. Download this whitepaper for:
• A brief overview of APIs
• Common API security vulnerabilities
• Best practices for properly testing your mission-critical APIs



Headquarters: 531 Esty Street Ithaca, NY 14850

At GrammaTech, we help our customers, partners, and government sponsors solve the most challenging software issues of today and tomorrow, safeguarding embedded mission-critical devices from failure and cyber attack. With our security-first software design philosophy, you can rely on GrammaTech to help you design, develop, and deploy trusted software applications - minimizing corporate risks and maximizing your competitive position.


Since its inception, iboss has challenged the status quo in enterprise security, launching innovative, patented technology delivered direct-to-cloud via proprietary node-based cloud container architecture. iboss advanced threat defense features gives security professionals visibility into previously hidden communication channels, and the security tools needed to close the critical data protection gap that can leave even the largest networks vulnerable.

Illusive Networks

Headquarters: Tel Aviv, Israel

Illusive Networks is a cybersecurity firm headquartered in Tel Aviv, Israel. The company produces technology that deceives cyber attackers by planting false information about given network's resources.

WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.