IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo and Intel
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

Lenovo and Intel

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Malicious Cryptominers are Eyeing Your Resources.
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

How Neustar Security Solutions Helps MLB Advanced Media Defend and Deliver Baseball Content
sponsored by Neustar
CASE STUDY: In recent years, MLB Advanced Media (MLBAM) has released a number of mobile apps and a subscription streaming service. In order to continue offering reliable access and prevent DDoS attacks, MLBAM was looking for a new security solution provider. In this case study, learn how Neustar was able to meet these pressing needs.
Posted: 14 Feb 2019 | Published: 08 Nov 2017

Neustar

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by Katie Moussouris, CEO of Luta Security, to talk about bugs, bug bounties and their impact on security and privacy.
Posted: 24 Aug 2018 | Premiered: Aug 13, 2018

Cylance

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement