IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

PhishLabs

CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc

What Is Application Security?
sponsored by Veracode, Inc.
DATA SHEET: As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Veracode, Inc.

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

Asplundh Tree Expert
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Asplundh, a vegetation management organization, partnered with Absolute to establish inventory management and secure the devices of their increasingly distributed workforce.
Posted: 19 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info