IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code. Because the infrastructure of the Internet, financial institutions and many other critical systems in the U.S. run on open source software, the security of these applications is crucial.Participants in the project were given grants from Homeland  … 
Definition continues below.
Internet Security Reports
1 - 25 of 223 Matches Previous Page  |  Next Page
DNS Hijacking and Phishing - Easy Exploits
sponsored by Neustar®
WHITE PAPER: This white paper explores several steps you can take you reduce the number of human and technical vulnerabilities to mitigate the risks of phising and DNS hijacking attacks. Continue reading to learn how to better protect your network.
Posted: 20 May 2015 | Published: 06 May 2015

Neustar®

Case Study: Open Source DNS vs. Bots
sponsored by Nominum, Inc.
CASE STUDY: This case study examines the challenges and consequences that occur when bots lurk in your network.  View now to learn how to remove current bots and block future attacks.
Posted: 12 May 2015 | Published: 25 Mar 2015

Nominum, Inc.

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks

7 ways bots hurt your website
sponsored by Distil Networks
WHITE PAPER: This webcast examines the seven ways that bots can destroy your website and how you can defend yourself against ruin.
Posted: 10 Apr 2015 | Published: 21 Jan 2015

Distil Networks

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

A Holistic Approach to Fending off Bots and Bot Networks
sponsored by Distil Networks
WHITE PAPER: In this white paper, discover how a cloud-based strategy can block bots in real-time before data and intellectual property theft can occur. View now to learn more.
Posted: 09 Apr 2015 | Published: 04 Feb 2015

Distil Networks

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Cloudmark Security Platform for DNS
sponsored by Cloudmark
ASSESSMENT TOOL: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cloudmark

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
1 - 25 of 223 Matches Previous Page    1 2 3 4    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  Security: Stanford University ($841,276), Coverity ($297,000) and Symantec ($100,000). Stanford and Coverity collaboratively developed Prevent, an automated system for scanning submissions from open source programmers to popular projects. Vulnerabilities found are documented in a database for the development community. Coverity employs a rating system called the "Scan Ladder" to rank projects on a progressive track to security certification. Symantec's role is to test out Scan in the proprietary software that they work with and to provide security expertise.Homeland Security lists the Department's … 
Internet Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement