IT Management  >   Systems Operations  >   Security  >  

Website Security

RSS Feed    Add to Google    Add to My Yahoo!
Website SecurityReports
 
How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Technical Guide on Malware Trends
sponsored by ESET
EGUIDE: TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

ESET

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate
sponsored by Thawte Inc.
WHITE PAPER: This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Thawte Inc.

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER: With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

How to prevent cross-site scripting attacks: Expert tactics
sponsored by Veracode, Inc.
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Veracode, Inc.

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

WebPulse Technical Overview
sponsored by BlueCoat
WHITE PAPER: The Blue Coat WebPulse™ is a cloud-based infrastructure specifically designed to harness the power of user-driven behavior and to translate user input into global web and web threat intelligence. Learn how WebPulse employs multiple technologies to analyze and deliver the fastest and most accurate web ratings service available.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT: This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

FireEye

How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by Thawte Inc.
EGUIDE: In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement