Boulevard Library

Security Boulevard Library

Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more – all that will help you in your security journey. Access requires only a free registration. Search, scroll through and download what you like.

Open and Dark Web Research: Tips and Techniques

Open and Dark Web Research: Tips and Techniques

Cyber threat intelligence’s alignment with the traditional, OSINT processes of our intelligence community, law enforcement, and the military continues to grow. At Authentic8, a team of experienced cross-functional intelligence analysts builds “Flash Reports” for the readers to augment their OSINT techniques. Authentic8 has packaged some of these reports to help ... Read more
Authentic8
SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters

SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters

SANS threat hunting experts Mathias Fuchs and Joshua Lemon capture the different needs within organizations that are just starting their threat hunting journey, versus those who are honing their skills and programs. Read the report to help grow your program and improve threat hunting with: Definitions of threat hunting Methodologies ... Read more
Authentic8
Open Source Security: Weighing the Pros and Cons

Open Source Security: Weighing the Pros and Cons

Over the past few years, open source has grown in popularity, especially among developers using open source code in their application development efforts. Open source software offers incredible benefits to enterprises IT and development efforts. Free, available software libraries mean cost savings, easy customization, speed, agility and flexibility for development ... Read more
Security Boulevard
Developers Are Taking Over AppSec

Developers Are Taking Over AppSec

Application security is a top priority today for companies that are developing software. However, it is also becoming more challenging and complex as release frequency continues to rise and the requirements for data security are getting stricter. Thanks to new DevOps practices and tools, development cycles are getting shorter, allowing ... Read more
WhiteSource
The Forrester Wave: Software Composition Analysis, 2019

The Forrester Wave: Software Composition Analysis, 2019

Forrester states that one in eight open source component downloads contained a known security vulnerability and security pros now have less time to identify and remediate them. In order to keep up, an SCA solution is necessary. This report identifies the 10 most significant software composition analysis providers—Flexera, FOSSA, GitLab, ... Read more
WhiteSource
What Are the Most Secure Programming Languages?

What Are the Most Secure Programming Languages?

Behind every developer is a beloved programming language. In heated debates over which language is the best, the security card will come into play in support of one language or discredit another. We decided to address this debate and put it to the test by researching WhiteSource’s comprehensive database. We focused ... Read more
WhiteSource
The Next Generation of Application Security

The Next Generation of Application Security

Application security is usually done by finding, fixing and preventing vulnerabilities, with an emphasis on finding solutions to prevent cybersecurity events in the future. However, many of the breaches we’re seeing are caused by a vulnerability related to the application, often because developers move so quickly to push out new ... Read more
Security Boulevard
Container Security 101: Understanding the Basics of Securing Containers

Container Security 101: Understanding the Basics of Securing Containers

By now it’s apparent to cybersecurity teams everywhere that the proverbial container genie is out of the bottle. Developers have widely embraced containers because they make building and deploying so-called cloud native applications simpler than ever. Not only do containers eliminate much of the friction typically associated with moving application ... Read more
Security Challenges in the Cloud: Solving for Visibility and Protection Across Architectures

Security Challenges in the Cloud: Solving for Visibility and Protection Across Architectures

With the rise of cloud native applications, IT organizations in the never-ending pursuit of increased agility have now started to embrace new platforms at faster rates than ever before. There are now no less than three distinct layers of cloud native abstractions that are simultaneously being employed to run varying ... Read more
How to Identify Compromised Devices with Certainty

How to Identify Compromised Devices with Certainty

It seems like there is an endless amount of exciting new devices these days, capable of things people never thought possible. But as with any technology stack, all devices come with inherent risks. Most security products only protect a fraction of all endpoints or require an agent to be installed ... Read more
Core Security
Loading...