IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Security White Papers (View All Report Types)
 
2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Web security buyers guide
sponsored by Sophos, Inc.
WHITE PAPER: A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos, Inc.

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success
sponsored by Breach Security
WHITE PAPER: This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies.
Posted: 14 Aug 2009 | Published: 08 Jun 2009

Breach Security

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

The 10 myths of safe web browsing
sponsored by Sophos, Inc.
WHITE PAPER: Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement