IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code. Because the infrastructure of the Internet, financial institutions and many other critical systems in the U.S. run on open source software, the security of these applications is crucial.Participants in the project were given grants from Homeland  … 
Definition continues below.
Internet Security Reports
1 - 25 of 243 Matches Previous Page  |  Next Page
Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Profiling an Enigma: What We Know About North Korea's Cyber Warfare Capabilities
sponsored by Hewlett-Packard Company
PODCAST: This podcast takes a look at what is known about North Korea's cyber warfare programs, and how the country maintains such secrecy in these matters.
Posted: 16 Feb 2015 | Premiered: Oct 29, 2014

Hewlett-Packard Company

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Fighting Cybercrime Requires Thinking Like the Bad Guys
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll find out how to safeguard your business by changing the way you invest in and think about security – from the perspective of the cyberthreats targeting you.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Hewlett-Packard Company

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 01 Feb 2015 | Published: 30 Dec 2013

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Incident Response: How to Fight Back, A SANS Survey
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Collaborative Defense – HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

La-Z-Boy Incorporated
sponsored by Zscaler
CASE STUDY: This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation
1 - 25 of 243 Matches Previous Page    1 2 3 4    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  Security: Stanford University ($841,276), Coverity ($297,000) and Symantec ($100,000). Stanford and Coverity collaboratively developed Prevent, an automated system for scanning submissions from open source programmers to popular projects. Vulnerabilities found are documented in a database for the development community. Coverity employs a rating system called the "Scan Ladder" to rank projects on a progressive track to security certification. Symantec's role is to test out Scan in the proprietary software that they work with and to provide security expertise.Homeland Security lists the Department's … 
Internet Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement