Coding Unified RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Coding Unified Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Intrusion Prevention Solutions
 •   Network Management
 •   Security Monitoring

Related Searches
 •   Benefit Of Coding
 •   Capture Coding Unified Risk
 •   Coding Experts
 •   Coding North Dakota
 •   Coding Trends
 •   Coding Unified Export
 •   Coding Washington
 •   Finds Coding Unified Risk
 •   Improving Coding
 •   Make Coding
Advertisement

ALL RESULTS
1 - 25 of 449 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC

September 30, 2013 - (Free Research)
View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

October 06, 2009 - (Free Research)
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance. 
(WHITE PAPER) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 26, 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Empower your Developers by Coverity

May 16, 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 18, 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Understanding Avaya IP Office Short Codes by Global Knowledge

May 01, 2013 - (Free Research)
This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses. 
(WHITE PAPER) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 15, 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 02, 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation by Dell Software

August 22, 2012 - (Free Research)
Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 28, 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report Volume 4 by Veracode, Inc.

December 07, 2011 - (Free Research)
Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors. 
(WHITE PAPER) READ ABSTRACT |

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services by F5 Networks

December 2004 - (Free Research)
Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies by SearchWinIT

May 2010 - (Free Research)
When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk. 
(EZINE)

Battery Technology for Data Centers and Network Rooms: Fire Safety Codes - USA by APC by Schneider Electric

October 2011 - (Free Research)
Proper interpretation of the fire codes is essential in the design and implementation of data centers and network rooms. This resource explores fire safety regulations and their application to uninterrupted power supply (UPS) battery installations. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 449 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts