IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed   
Internet Application Security Reports
 
Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

DNS-Layer Protection & Secure Web Gateway Security Efficacy Test Results
sponsored by Cisco Umbrella
RESOURCE: In 2019, AV-TEST, an independent IT security institute, was commissioned by Cisco to conduct a study comparing Cisco cloud security with similar industry-leading solutions to determine the malware protection and phishing block capabilities of all vendors. Read on to uncover the results.
Posted: 02 Mar 2020 | Published: 18 Feb 2020

Cisco Umbrella

Core - DNS - Punycode: Awareness and Protection
sponsored by Cisco Umbrella
WEBCAST: Have you ever come across a domain name that was almost identical to a familiar site, but instead was a malicious link? If so, you’ve likely come across a specific kind of attack known as Punycode. In this short webinar, explore Punycode: what it is, how it is commonly used, why it’s important & examples to keep an eye out for.
Posted: 04 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
EBOOK: How can you protect your organization from malicious cryptomining? Download this brief to learn how Cisco Umbrella can block at the IP and domain level, as well as analyze risky domains and much more.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Cisco Umbrella

Web Browser-Based Attacks
sponsored by Morphisec, Inc.
RESOURCE: Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

The Missing Link in Website Security
sponsored by Tala Security
WHITE PAPER: Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Tala Security

Morphisec Allows Citizens Medical Center to Focus on Saving Lives
sponsored by Morphisec, Inc.
CASE STUDY: In this case study, follow the journey of Citizens Medical Center, a hospital in Texas, as they partner with Morphisec to address the endpoint security needs of their increasingly distributed environment while overcoming challenges related to budgetary constraints and access to talent. Download now to learn more.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Morphisec, Inc.

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

How to Keep API Secure from Bot Cyberattacks
sponsored by Radware
WHITE PAPER: Application programming interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. Despite their rapid and widespread deployment, APIs remain poorly protected and can leave business-critical services are at risk due to bot attacks. Learn how you can stay protected in this white paper.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info