Search Refinements
Search Results: White Papers
1-10 of 10 results

Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a...

Published 22 February 2011

Web Application Security for Dummies®

Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent...

Published 22 February 2011

IT Policy Compliance For Dummies

This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After...

Published 03 November 2010

Justifying IT Security - Managing Risk and Keeping Your Network Secure

The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely...

Published 03 November 2010

PCI Compliance for Dummies

Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and...

Published 03 November 2010

Responding to the New Information Risk Landscape

This paper analyses the trends and changing priorities of the emerging information security landscape, setting out a new action agenda for managing...

Published 03 November 2010

The Top 10 Reports for Managing Vulnerabilities

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability...

Published 03 November 2010

Understanding and Selecting a Database Assessment Solution

Database Assessment is not just a security precaution, but an integral part of database operations management. This whitepaper provides the...

Published 03 November 2010

Web Application Security — How to Minimise Prevalent Risk of Attacks

The guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning...

Published 03 November 2010

Winning the PCI Compliance Battle

This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also...

Published 03 November 2010

1-10 of 10 results

Join our network

716 people like this.
1528 people follow this.

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.