All resources sponsored by:

Imperva

1 - 25 of 51 Matches
Presentation Transcript: Emerging security threats: Know your enemy in 2014
sponsored by Imperva
TRANSCRIPT:In this presentation transcript, Johannes Ulrich, Dean of Research at the SANS technology institute, discusses new spearfishing attacks and explains how utilizing DNS logs can help organizations keep their network secure from these devastating new threats.
Posted: 08 Apr 2014 | Published: 08 Apr 2014
Get This Now


Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE:Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE:This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014
Get This Now


Podcast: Emerging Security Threats: Know Your Enemy in 2014
sponsored by Imperva
PODCAST:Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Johanne B. Ullrich, dean of research for the SANS Technology Institute, shows you how.
Posted: 03 Mar 2014 | Premiered: Feb 24, 2014
Get This Now


Five Common Web Application Vulnerabilities and How to Avoid Them
sponsored by Imperva
EGUIDE:In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014
Get This Now


Return to Sender: Improving Email Security with DMARC
sponsored by Imperva
EGUIDE:Learn how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security in this expert e-guide.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Emerging Security Threats: Know Your Enemy in 2014
sponsored by Imperva
WEBCAST:Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Ullrich shows you how.
Posted: 27 Feb 2014 | Premiered: Feb 21, 2014
Get This Now

TOPICS:  .NET

Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST:This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013
Get This Now


What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER:Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013
Get This Now


Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER:This white paper explains the latest hactivist and cybercriminal methods of attack, and presents as 7-step guide to help you prepare for and prevent these motivated threats.
Posted: 20 Feb 2014 | Published: 31 Dec 2013
Get This Now


Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER:Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER:This resource offers a Web application firewall solution that addresses the Open Web Application Security Project (OWASP) Top 10 security risks.
Posted: 19 Feb 2014 | Published: 31 Dec 2013
Get This Now


TicketNetwork Selects SecureSphere to Secure Transactions
sponsored by Imperva
CASE STUDY:This white paper highlights a quick-to-deploy Web application firewall that offers the scalability needed to handle a large number of online transactions, as well as a malicious IP address blocking feature to ensure data access and security.
Posted: 19 Feb 2014 | Published: 31 Dec 2011
Get This Now


The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER:This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012
Get This Now


Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
WEBCAST:While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014
Get This Now


Malware Attacks Demand a New Malware Defense Approach
sponsored by Imperva
EGUIDE:Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013
Get This Now


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
Get This Now


Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012
Get This Now


E-Guide: Shortcut guide to Web application firewall deployment
sponsored by Imperva
EGUIDE:Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
Posted: 22 Sep 2011 | Published: 22 Sep 2011
Get This Now


Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER:Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011
Get This Now


Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER:Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011
Get This Now


Death and Taxes...and Hackers
sponsored by Imperva
VIDEO:View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011
Get This Now


E-Book: Strategic guide to insider threat detection and breach response
sponsored by Imperva
EGUIDE:Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011
Get This Now


10 Building Blocks for Securing File Data
sponsored by Imperva
WHITE PAPER:This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


The Business Case for Data Security
sponsored by Imperva
WHITE PAPER:This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
Get This Now


1 - 25 of 51 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement