IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code. Because the infrastructure of the Internet, financial institutions and many other critical systems in the U.S. run on open source software, the security of these applications is crucial.Participants in the project were given grants from Homeland  … 
Definition continues below.
Internet SecurityReports
151 - 175 of 217 Matches Previous Page  | Next Page
Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

Buyer's Guide to Antimalware
sponsored by SearchSecurity.com
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

SearchSecurity.com

Web Application Security: Protect Your Critical Web Applications
sponsored by Imperva
WHITE PAPER: This white paper introduces the market-leading SecureSphere Web Application Firewall, which transforms the way in which businesses protect their applications by automating web security and providing flexible, transparent deployment.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Imperva

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings
sponsored by Trend Micro, Inc.
WHITE PAPER: 3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.
Posted: 28 Jun 2011 | Published: 28 Jun 2011

Trend Micro, Inc.

Why Hackers have turned to Malicious JavaScript Attacks
sponsored by Sophos, Inc.
WHITE PAPER: Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER: This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

M86 Security

Trend Micro Endpoint Comparative Report Performed by AV-Test.org
sponsored by Trend Micro, Inc.
WHITE PAPER: In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.

Malicious JavaScript Attacks: What Can You Do?
sponsored by Sophos, Inc.
WHITE PAPER: We’ll review what to watch for, as well as the security strategies that will help keep you safe.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

Sophos, Inc.

FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

The Children's Internet Protection Act
sponsored by NETGEAR Inc.
WHITE PAPER: Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more.
Posted: 17 Dec 2010 | Published: 17 Dec 2010

NETGEAR Inc.

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
sponsored by NETGEAR Inc.
CASE STUDY: Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
Posted: 17 Dec 2010 | Published: 17 Dec 2010

NETGEAR Inc.

E-commerce and Consumer Retailing: Risks and Benefits
sponsored by ISACA
WHITE PAPER: ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

ISACA

Presentation Transcript: Making Time for Endpoint Security
sponsored by BigFix
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.
Posted: 29 Nov 2010 | Published: 29 Nov 2010

BigFix

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Top 10 Tips to Keep Your Small Business Safe
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
Posted: 19 Nov 2010 | Published: 17 Nov 2010

Trend Micro, Inc.

Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security
sponsored by IBM
CASE STUDY: Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use.
Posted: 24 Sep 2010 | Published: 01 Oct 2009

IBM

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.
Posted: 10 May 2010 | Published: 10 May 2010

St. Bernard Software

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

AVG Technologies USA, Inc.

Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.
sponsored by AVG Technologies USA, Inc.
CASE STUDY: Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

MegaPath Site-to-Site MPLS VPN
sponsored by MegaPath Inc.
WHITE PAPER: Your employees in remote locations need the same fast, reliable, secure and cost-effective access to information and applications as your employees at headquarters. MegaPath Site-to-Site MPLS VPN is the simple solution. Read this white paper to learn how to MegaPath Site-to-Site MPLS VPN means more security, more selection, and more service.
Posted: 30 Mar 2010 | Published: 30 Mar 2010

MegaPath Inc.

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
sponsored by Sophos, Inc.
PRESENTATION TRANSCRIPT: Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Sophos, Inc.

Information Security Magazine - February 2010: Under Control
sponsored by Information Security Magazine
EZINE: Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Information Security Magazine
151 - 175 of 217 Matches Previous Page    5 6 7 8 9    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  Security: Stanford University ($841,276), Coverity ($297,000) and Symantec ($100,000). Stanford and Coverity collaboratively developed Prevent, an automated system for scanning submissions from open source programmers to popular projects. Vulnerabilities found are documented in a database for the development community. Coverity employs a rating system called the "Scan Ladder" to rank projects on a progressive track to security certification. Symantec's role is to test out Scan in the proprietary software that they work with and to provide security expertise.Homeland Security lists the Department's … 
Internet Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement