Tuesday, April 29, 2014

Tech Resources: The latest and greatest from The Register

The Register
Tech Resources

29 April 2014

Hello, etechnews today.
Log in to alter your email preferences Login

Check out our other feeds and services

Hello etechnews today Welcome to this Tech Resources update from The Register

Mobile application security study

Mobile applications represent a growing threat to the enterprise. But how big of a threat? HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out.

Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

Download Now

3 Big data security analytics techniques

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight - a Security Information and Event Management (SIEM) solution from HP - applies these techniques to spot and stop attacks.

APTs use a “low and slow” attack profile that is difficult to distinguish from legitimate activity. But by correlating massive amounts of data from multiple sources you can detect and stop them. The paper presents three techniques that you can apply to any IT environment:

1. Detect account abuse by insiders and APTs.
2. Identify data exfiltration by APTs.
3. Identify and alert to new program execution.

For each technique, the paper presents an approach to detecting the situation and details the steps to implement the approach. Then it goes further to show how HP ArcSight does it. Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.

Download Now

Securing web applications made simple and scalable

The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them.

According to the SANS survey on application security, poor understanding of web security needs on the part of developers also limit the effectiveness of application security programs.

In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.

Download Now

SANS Security Analytics survey

The volume of log and event data that security managers must sort through to find evidence of cyber attacks is escalating - beyond the capabilities of existing log management and security information and event management (SIEM) solutions to collect and analyze.

This SANS Analyst survey asked 647 security and network professionals what advanced threats they experience, what tools and methods they use to detect them, and how effective those tools have been. Their conclusion: today’s enterprises need a new approach based on Big Data security analytics and a new generation of SIEM solution. Read the full report to learn why.

Download Now

Designing a defence for mobile apps

With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.

Mobile apps may be a threat, but they don’t have to be.

In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.

Download Now


Terms and Conditions

By downloading any of the papers, or by watching for any of the live or on-demand events above, you agree that your supplied personal details will be passed on to the sponsor of the paper/event, and that this organisation may contact you in the future with further information about their products and services. You can request a stop to such communications at any time.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.