Published By: Klocwork
Published Date: May 11, 2011
This technical white paper looks at the issues of developing for multicore and multiprocessor environments in detail, explains how static analysis can be used to address them, and walks through two examples of these issues in prominent open source projects.
Published By: Klocwork
Published Date: May 11, 2011
This white paper examines how the next generation of source code analysis tools are moving high-quality source code analysis to the developer's desktop and performing it at the earliest point in the development cycle - before code check-in. Learn why the developer must be an integral part of the process of identifying, fixing and preventing bugs from reaching the code stream.
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Published By: Coverity, Inc.
Published Date: Feb 26, 2010
Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.
Published By: Coverity, Inc.
Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Published By: Coverity, Inc.
Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Published By: Intel Security
Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Published By: Intel Security
Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes:
Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7
Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent
Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox
Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy
concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.
Add Research
Get your company's research in the hands of targeted business professionals.