IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
Exploiting a Pandemic: White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

State of the Internet / Security: Financial Services — Hostile Takeover Attempts
sponsored by Akamai
WHITE PAPER: Learn about spikes in credential stuffing attacks against APIs, LFI passing SQLi as a leading web attack vector, and a DDoS attack against one bank that reached an astounding 160 Gbps.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Akamai

Infographic: Inside the Mobile Attack Surface
sponsored by NowSecure
RESOURCE: As mobile applications continue to play a critical role in communication, productivity and user experience, ensuring security becomes increasingly important. Download the following infographic for an overview of the mobile application attack surface, which includes common areas for potential privacy and security gaps.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

NowSecure

Global Data at Risk: State of the Web Report
sponsored by Tala Security
WHITE PAPER: 2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Your CISSP Prep Guide
sponsored by TechTarget
RESOURCE: Obtaining a CISSP certification is globally recognized as a standard of achievement for security professionals. And whether you have already obtained your CISSP certification or are studying for the test, our CISSP prep guide can help you! To gain access to this guide, provide your valuable insight in our Endpoint Security Research Survey.
Posted: 22 Apr 2020 | Published: 30 Apr 2019

TechTarget

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST: Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

WhiteHat Security

Mitigating Application DDoS Attacks
sponsored by F5 Networks
WEBCAST: Your network, DNS & TLS are not often thought of as being part of applications. Yet DoS or DDoS attacks against these tiers can render your networks, apps or other supporting infrastructure inaccessible. The challenge is identifying & blocking attackers’ requests whilst still allowing clean traffic. View this webinar to learn how to do this.
Posted: 08 Sep 2020 | Premiered: Sep 8, 2020

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info