IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Security White Papers (View All Report Types)
 
Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by Threat Track Security
WHITE PAPER: This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
Posted: 21 May 2015 | Published: 29 Apr 2015

Threat Track Security

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

The 10 myths of safe web browsing
sponsored by Sophos, Inc.
WHITE PAPER: Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER: The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010

M86 Security

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER: This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Features of a Comprehensive Application Security Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the features of a comprehensive application security solution.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement