IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Malicious Cryptominers are Eyeing Your Resources.
sponsored by Cisco Umbrella
EBOOK: Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

The Security Concerns of Cloud Cryptomining Services
sponsored by Cisco Umbrella
EGUIDE: With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.
Posted: 26 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW: It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Proofpoint

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Why Web Performance Matters
sponsored by Cloudflare
VIDEO: Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.
Posted: 23 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info