Fortify Software

Displaying 1-13 of 13 results

  • White Papers // Nov 2009

    A Fundamental Checklist for Protecting America's Most Valuable Digital Information

    The Federal Information Security Management Act of provides a comprehensive framework for ensuring effective information security controls for all federal information and assets. The Act aims to bolster computer and network security within the Federal Government and affiliated parties such as contractors by mandating periodic audits. Based on this framework,...

    Provided By Fortify Software

  • White Papers // Jan 2009

    CISO's Guide To: Web 2.0 Security

    Web 2.0 has made the Web a livelier and friendlier place, with social Web sites, wikis, blogs, mashups and interactive services that are fun as well as useful. There are two Web 2.0 concepts that change the game for CISOs and that they need to understand. The first is the...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    The Changing Role of the Security Leader

    The presenters' power panel of three security leaders of this webcast will explore their day-to-day priorities, gain insight into how their initiatives and organizations have changed in the down economy, and the attendee will learn how they are measuring success in their programs.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Software Assurance: An Executive Discussion on Securing the Enterprise

    The attendee of this webcast will understand what executives are doing today to assess the threat to their organizations and take steps needed to ensure the security of their most important assets - their information technology and data. Understand from these experienced executives why traditional security strategies are failing today....

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Best Practices in Cyber Defense From the US Air Force

    Currently, the Air Force is the only branch establishing a Cyber Command to prepare for fighting wars in cyberspace. A key part of this initiative is to secure custom-built applications that handle highly sensitive capabilities, such as logistics and personal information. The attendee of this webcast will learn how hackers...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Integrating Security Testing Into QA

    This webcast discusses how to uncover security vulnerabilities while conducting a regular functional test. The presenter will show how to use new technology so that QA groups can contribute to finding security issues without any additional work. The attendee will learn how to fully integrate security testing into the QA...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    True Cost of Failing PCI Compliance

    While PCI deadlines have come and gone, many leading retail companies have taken aggressive steps to adopt each requirement. These companies have realized the true cost of failing a PCI audit isn't just a fine, but an increase in risk for a major data breach. The presenter will discuss how...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Securing Online Banking: Security Lessons From the Pros

    The attendee of this webcast will learn how the world's leading financial institutions balance risk against the pressures of delivering software to customers quickly, how developers are trained to write code securely and how software security tools, such as dynamic and static analysis, are deployed for optimal use.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    PCI Compliance - Learn Everything You Need to Know

    The presenter of this webcast will provide with an overview of PCI as well as advice on avoiding common PCI pitfalls to avoid costly penalties.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Dig Your Own Hole - 12 Ways to Go Wrong With Java Security

    This webcast explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java - based applications. Approaching security with an "Outside in" style, it look at vulnerabilities from a developer's perspective, focusing on the source code.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    What You Need to Know to Protect Your Web Applications: A New Look at Application Firewalls

    The attendee of this webcast will learn what they need to know to protect their web applications. This webcast throws light at new application firewalls.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    The Top 10 Software Security Vulnerabilities

    The presenter of this webcast shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.

    Provided By Fortify Software

  • White Papers // Dec 2008

    A CISO's Guide to Application Security

    They cost time and effort in litigation, remediation, and reputation restoration. But when it comes to security, businesses rarely do it right. Many IT decision-makers tend to focus their security efforts almost exclusively at the network perimeter. They overlook the business applications that run their day-to-day operations - especially partner...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    The Changing Role of the Security Leader

    The presenters' power panel of three security leaders of this webcast will explore their day-to-day priorities, gain insight into how their initiatives and organizations have changed in the down economy, and the attendee will learn how they are measuring success in their programs.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Software Assurance: An Executive Discussion on Securing the Enterprise

    The attendee of this webcast will understand what executives are doing today to assess the threat to their organizations and take steps needed to ensure the security of their most important assets - their information technology and data. Understand from these experienced executives why traditional security strategies are failing today....

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Best Practices in Cyber Defense From the US Air Force

    Currently, the Air Force is the only branch establishing a Cyber Command to prepare for fighting wars in cyberspace. A key part of this initiative is to secure custom-built applications that handle highly sensitive capabilities, such as logistics and personal information. The attendee of this webcast will learn how hackers...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Integrating Security Testing Into QA

    This webcast discusses how to uncover security vulnerabilities while conducting a regular functional test. The presenter will show how to use new technology so that QA groups can contribute to finding security issues without any additional work. The attendee will learn how to fully integrate security testing into the QA...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    True Cost of Failing PCI Compliance

    While PCI deadlines have come and gone, many leading retail companies have taken aggressive steps to adopt each requirement. These companies have realized the true cost of failing a PCI audit isn't just a fine, but an increase in risk for a major data breach. The presenter will discuss how...

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Securing Online Banking: Security Lessons From the Pros

    The attendee of this webcast will learn how the world's leading financial institutions balance risk against the pressures of delivering software to customers quickly, how developers are trained to write code securely and how software security tools, such as dynamic and static analysis, are deployed for optimal use.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    PCI Compliance - Learn Everything You Need to Know

    The presenter of this webcast will provide with an overview of PCI as well as advice on avoiding common PCI pitfalls to avoid costly penalties.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    Dig Your Own Hole - 12 Ways to Go Wrong With Java Security

    This webcast explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java - based applications. Approaching security with an "Outside in" style, it look at vulnerabilities from a developer's perspective, focusing on the source code.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    What You Need to Know to Protect Your Web Applications: A New Look at Application Firewalls

    The attendee of this webcast will learn what they need to know to protect their web applications. This webcast throws light at new application firewalls.

    Provided By Fortify Software

  • Webcasts // Jan 2009

    The Top 10 Software Security Vulnerabilities

    The presenter of this webcast shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.

    Provided By Fortify Software

  • White Papers // Nov 2009

    A Fundamental Checklist for Protecting America's Most Valuable Digital Information

    The Federal Information Security Management Act of provides a comprehensive framework for ensuring effective information security controls for all federal information and assets. The Act aims to bolster computer and network security within the Federal Government and affiliated parties such as contractors by mandating periodic audits. Based on this framework,...

    Provided By Fortify Software

  • White Papers // Dec 2008

    A CISO's Guide to Application Security

    They cost time and effort in litigation, remediation, and reputation restoration. But when it comes to security, businesses rarely do it right. Many IT decision-makers tend to focus their security efforts almost exclusively at the network perimeter. They overlook the business applications that run their day-to-day operations - especially partner...

    Provided By Fortify Software

  • White Papers // Jan 2009

    CISO's Guide To: Web 2.0 Security

    Web 2.0 has made the Web a livelier and friendlier place, with social Web sites, wikis, blogs, mashups and interactive services that are fun as well as useful. There are two Web 2.0 concepts that change the game for CISOs and that they need to understand. The first is the...

    Provided By Fortify Software