IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed   
Internet Application Security Reports
 
Build a Strategic Approach to Network and App Security
sponsored by Citrix
EBOOK: In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

Citrix

Why Your Company Needs Third-Party Security for Office 365
sponsored by Symantec
RESEARCH CONTENT: Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.
Posted: 24 Apr 2019 | Published: 28 Feb 2019

Symantec

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Advanced Protection for Web Applications on AWS
sponsored by Amazon Web Services
WHITE PAPER: As companies migrate business-critical applications from their on-premises infrastructure to the cloud, they increase their exposure to known and unknown targeted attacks. In this white paper, learn how organizations can combat these threats by deploying a security solution designed specifically for internet-facing applications such as a WAF.
Posted: 04 Sep 2019 | Published: 21 Aug 2019

Amazon Web Services

Are Your People Sharing Too Much Information?
sponsored by BT
RESOURCE: What is published on the internet may be there forever, and in the wrong hands this open source intelligence could be used against you. In this article, explore 3 steps organizations can take to help prevent sensitive company data form being unintentionally shared.
Posted: 07 Jun 2019 | Published: 31 May 2019

BT

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Why CASB Alone Isn't Enough
sponsored by Open Systems
WHITE PAPER: Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.
Posted: 13 May 2019 | Published: 13 May 2019


How to solve DNS security issues in your organization
sponsored by TechTarget
RESOURCE: The urgency to implement DDoS protection has never been higher. Without better protection, brand damage, revenue loss and hefty fines can occur. In fact, according to Neustar's Q1 2019 Threats & Trends Report, there has been a 200% increase in the number of DDoS attacks comparing Q1, 2019 to Q1, 2018. Luckily, a secure DNS can
Posted: 03 Aug 2019 | Published: 06 Sep 2019

TechTarget

How to Address Key SSL Security Issues and Vulnerabilities
sponsored by A10 Networks
EGUIDE: Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement