IT Management  >   Systems Operations  >   Security  >  

Internet Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Website, Web Security, Website Security, Control Internet Access, Web Site Security
DEFINITION: The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code. Because the infrastructure of the Internet, financial institutions and many other critical systems in the U.S. run on open source software, the security of these applications is crucial.Participants in the project were given grants from Homeland  … 
Definition continues below.
Internet SecurityReports
51 - 75 of 218 Matches Previous Page  | Next Page
Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

NGFW Critical to SMB Network
sponsored by Dell Software
WHITE PAPER: In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.
Posted: 08 Jan 2013 | Published: 08 Jan 2013

Dell Software

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by SearchSecurity.com
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

Managing Web Security in an increasingly Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER: In this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

Thawte Inc.

Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

ISM December 2012
sponsored by SearchSecurity.com
JOURNAL ARTICLE: In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
sponsored by Dell SonicWALL
EGUIDE: Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Dell SonicWALL

Secure Web Gateway Overview: Implementation Best Practices
sponsored by Sophos, Inc.
EGUIDE: This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Sophos, Inc.

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Next Generation Firewalls: Assessing the Business/Technology Issue
sponsored by Dell SonicWALL
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Securing your Online Data Transfer with SSL
sponsored by Thawte Inc.
WHITE PAPER: This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Thawte Inc.

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate
sponsored by Thawte Inc.
WHITE PAPER: This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Thawte Inc.
51 - 75 of 218 Matches Previous Page    1 2 3 4 5 6    Next Page
 
INTERNET SECURITY DEFINITION (continued): …  Security: Stanford University ($841,276), Coverity ($297,000) and Symantec ($100,000). Stanford and Coverity collaboratively developed Prevent, an automated system for scanning submissions from open source programmers to popular projects. Vulnerabilities found are documented in a database for the development community. Coverity employs a rating system called the "Scan Ladder" to rank projects on a progressive track to security certification. Symantec's role is to test out Scan in the proprietary software that they work with and to provide security expertise.Homeland Security lists the Department's … 
Internet Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement