Zero trust offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations. This research explores how organizations are deploying and planning to deploy a zero trust architecture. Sponsored by Archive360, BIO-key International, Progress MOVEit, SonicWall, and Symmetry Systems.
Learn how to secure your modern web applications from supply-side attacks to avoid the risk of a data breach, ensure data privacy and comply with regulations. Webinar hosted by PerimeterX on October 26, 2021.
Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Commissioned by PerimeterX.
The findings of an investigation into the use of open-source components in commercial off-the-shelf software—many of which have a list of known vulnerabilities—across five common software categories. Sponsored by GrammaTech.
An analysis of eight pentest providers in three categories: Assurance Consultancies, Boutique Security Consultancies and Managed Bug Bounty. Part 2 of a three-part white paper series. Sponsored by Cobalt Labs.
The history and background of pentesting, including barriers to the procurement of pentesting capabilities. Part 1 of a three-part white paper series. Sponsored by Cobalt Labs.
Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX.
Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth.