Published By: Perimeter
Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Published By: AirDefense
Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Published By: Blue Lane
Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking. Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking. The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks. Find out how Cenzic's ClickToSecure solution can help you secure your applications.
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective approach for shielding these vulnerabilities.