IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

.NET Security

RSS Feed    Add to Google    Add to My Yahoo!
.NET SecurityReports
 
Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

A Guide To Multi-Layered Web Security
sponsored by Akamai Technologies
WHITE PAPER: Unfortunately, multilayered web security is not as straightforward as businesses would like, which makes thwarting security attacks like the Heartbleed virus even more stressful. So what does it take to do it? Consult this guide to uncover the strategies and technology needed to deploy a powerful, multilayered web security project.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

Enterprise Security Solutions by Trend Micro
sponsored by Trend Micro, Inc.
RESOURCE CENTER: This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 26 Jan 2009 | Published: 26 Jan 2009

Trend Micro, Inc.

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.

WebSense Security Lab: Zero-Day in Critical Vulnerability
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Websense, Inc.

The 10 myths of safe web browsing
sponsored by Sophos, Inc.
WHITE PAPER: Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Web Security Solutions
sponsored by Websense, Inc.
WHITE PAPER: Read this whitepaper to learn ways to implement industry-leading URL filtering with extensive security capabilities that continuously watch the organization's assets for malicious activity and prevent them from being used in fraudulent attacks.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Websense, Inc.

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
sponsored by VeriSign EMEA
WHITE PAPER: This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement