Cenzic

Displaying 1-10 of 10 results

  • White Papers // Jun 2010

    Leveraging Managed Service Technology for Web Application Security

    Information security managers and directors are faced with the enormous responsibility of keeping Web applications secure from hackers. The ever-growing number of security threats and an increasing body of governmental regulations are overwhelming information security teams. With web applications constantly evolving, finding vulnerabilities is a challenging, costly, and time-consuming undertaking....

    Provided By Cenzic

  • White Papers // Jan 2010

    Cyber Security Predictions for the Next Decade

    The first decade of this century has been a significant period for cyber security. As the authors look back at the last ten years - which started with attacks at the network layer with major worms like Nimda and SQL Slammer, and fast forward to application level attacks in the...

    Provided By Cenzic

  • White Papers // Aug 2009

    Helping Defend the Government Web Infrastructure

    The new administration is dedicated to providing technology leadership including rolling out more online services to citizens. New CIO and CTO positions and other initiatives laid down by President Obama are truly commendable and are bound to produce positive results. Unfortunately Web's openness also attracts more threats and attacks against...

    Provided By Cenzic

  • Webcasts // May 2009

    Are Your Web Applications Secure?

    The threat of hackers and breaches in application security is a fact of life for security professionals; and though finding vulnerabilities fast and adapting to increase government regulations is the name of the game, just keeping up can leave one behind. The presenter will show how to manage application vulnerabilities...

    Provided By Cenzic

  • White Papers // May 2009

    California Identity Theft Laws & Application Security: AB 1950, SB 1386, and Beyond

    Application security and automated tools to assess application security vulnerabilities protect computerized information accessible through Web-enabled applications. Accordingly, application security tools are crucial for preventing unauthorized access, destruction, use, modification, or disclosure of personal information available through Web applications, as required by AB 1950. The Cenzic Hailstorm solution helps companies...

    Provided By Cenzic

  • White Papers // May 2009

    Stateful Assessment

    First generation Web application security vulnerability scanners employed an approach based on the use of signatures (matching of regular expressions) to detect vulnerabilities. This paper explores the limitations of signatures and provides examples of a more effective approach it termed Stateful Assessment. Stateful Assessment is based on a process of...

    Provided By Cenzic

  • White Papers // May 2009

    Web Application Security: The Truth About White Box Testing Vs. Black Box Testing

    This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient...

    Provided By Cenzic

  • White Papers // May 2009

    Continuous Testing of Production Web Applications

    Web application security is a key top-of-mind concern for general managers, CISO's, CIO's and security staff for businesses ranging from Fortune 100 multinationals to educational institutions. Widespread data breaches and intellectual property thefts have left few organizations untouched or unaware. Almost 70% of the vulnerabilities disclosed each month shows information...

    Provided By Cenzic

  • White Papers // May 2009

    Enabling Security in the Software Development Life Cycle (SDLC)

    New security vulnerabilities are found almost daily. When they are, the affected software must be retrofitted with an appropriate patch while companies fend off the wrath of customers. Applications have become the most fertile ground for attackers to ply their trade - seeking out the seemingly innocuous features and utilities...

    Provided By Cenzic

  • White Papers // May 2009

    Leveraging SaaS Technology for Web Application Security

    Information security managers and directors are faced with the enormous responsibility of keeping Web applications secure from hackers. The ever-growing number of security threats and an increasing body of governmental regulations are overwhelming information security teams. With Web applications constantly evolving, finding vulnerabilities is a challenging, costly, and time-consuming undertaking....

    Provided By Cenzic

  • White Papers // Aug 2009

    Helping Defend the Government Web Infrastructure

    The new administration is dedicated to providing technology leadership including rolling out more online services to citizens. New CIO and CTO positions and other initiatives laid down by President Obama are truly commendable and are bound to produce positive results. Unfortunately Web's openness also attracts more threats and attacks against...

    Provided By Cenzic

  • White Papers // May 2009

    California Identity Theft Laws & Application Security: AB 1950, SB 1386, and Beyond

    Application security and automated tools to assess application security vulnerabilities protect computerized information accessible through Web-enabled applications. Accordingly, application security tools are crucial for preventing unauthorized access, destruction, use, modification, or disclosure of personal information available through Web applications, as required by AB 1950. The Cenzic Hailstorm solution helps companies...

    Provided By Cenzic

  • White Papers // May 2009

    Stateful Assessment

    First generation Web application security vulnerability scanners employed an approach based on the use of signatures (matching of regular expressions) to detect vulnerabilities. This paper explores the limitations of signatures and provides examples of a more effective approach it termed Stateful Assessment. Stateful Assessment is based on a process of...

    Provided By Cenzic

  • White Papers // May 2009

    Web Application Security: The Truth About White Box Testing Vs. Black Box Testing

    This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient...

    Provided By Cenzic

  • White Papers // May 2009

    Continuous Testing of Production Web Applications

    Web application security is a key top-of-mind concern for general managers, CISO's, CIO's and security staff for businesses ranging from Fortune 100 multinationals to educational institutions. Widespread data breaches and intellectual property thefts have left few organizations untouched or unaware. Almost 70% of the vulnerabilities disclosed each month shows information...

    Provided By Cenzic

  • White Papers // May 2009

    Enabling Security in the Software Development Life Cycle (SDLC)

    New security vulnerabilities are found almost daily. When they are, the affected software must be retrofitted with an appropriate patch while companies fend off the wrath of customers. Applications have become the most fertile ground for attackers to ply their trade - seeking out the seemingly innocuous features and utilities...

    Provided By Cenzic

  • White Papers // May 2009

    Leveraging SaaS Technology for Web Application Security

    Information security managers and directors are faced with the enormous responsibility of keeping Web applications secure from hackers. The ever-growing number of security threats and an increasing body of governmental regulations are overwhelming information security teams. With Web applications constantly evolving, finding vulnerabilities is a challenging, costly, and time-consuming undertaking....

    Provided By Cenzic

  • Webcasts // May 2009

    Are Your Web Applications Secure?

    The threat of hackers and breaches in application security is a fact of life for security professionals; and though finding vulnerabilities fast and adapting to increase government regulations is the name of the game, just keeping up can leave one behind. The presenter will show how to manage application vulnerabilities...

    Provided By Cenzic

  • White Papers // Jan 2010

    Cyber Security Predictions for the Next Decade

    The first decade of this century has been a significant period for cyber security. As the authors look back at the last ten years - which started with attacks at the network layer with major worms like Nimda and SQL Slammer, and fast forward to application level attacks in the...

    Provided By Cenzic

  • White Papers // Jun 2010

    Leveraging Managed Service Technology for Web Application Security

    Information security managers and directors are faced with the enormous responsibility of keeping Web applications secure from hackers. The ever-growing number of security threats and an increasing body of governmental regulations are overwhelming information security teams. With web applications constantly evolving, finding vulnerabilities is a challenging, costly, and time-consuming undertaking....

    Provided By Cenzic