EGUIDE:
Bots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
WHITE PAPER:
Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
WHITE PAPER:
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
WHITE PAPER:
This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
WHITE PAPER:
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
EZINE:
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
WHITE PAPER:
Follow this step-by-step tutorial to create secure web applications that run inside your database using Oracle Application Express. You'll quickly learn how to easily build secure web forms, reports and charts.
EBOOK:
As a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.
WHITE PAPER:
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.