IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
10 Commandments for Securing Microservices
sponsored by Radware
RESOURCE: Before considering any next-generation WAF solution, make sure it meets the requirements of both development and operations (DevOps) and security teams. This resource provides a checklist of 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The Security Concerns of Cloud Cryptomining Services
sponsored by Cisco Umbrella
EGUIDE: With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.
Posted: 26 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Decryption Powered by the Gigamon Visibility Fabric with GigaSMART
sponsored by Gigamon
RESOURCE: Learn how the Gigamon Visibility Fabric with licensed GigaSMART Decryption can enable operations teams to have full visibility into encrypted traffic on any TCP port or application.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Gigamon

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

The Threat of Online Skimming to Payment Security
sponsored by Tala Security
RESOURCE: The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.
Posted: 09 Aug 2019 | Published: 01 Aug 2019

Tala Security

9 Email Security Features to Help Prevent Phishing Attacks
sponsored by Cisco Umbrella
EGUIDE: For as long as email exists, phishing will continue to be a threat. While the risks of phishing can’t be eliminated, your organization can enhance its email security to prevent a breach. In this e-guide, discover 9 email security features designed to help prevent phishing attacks.
Posted: 25 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

5 Things You Need to Know about a Web Application Firewall
sponsored by Neustar
WHITE PAPER: Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer-facing and mission-critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know before buying a WAF.
Posted: 14 Feb 2019 | Published: 13 Apr 2018

Neustar
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement