Variants White Papers

(View All Report Types)
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

The Power To Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat