IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
Intelligent Web Application Security
sponsored by Oracle Dyn
EBOOK: Through the use of bots, threats are becoming more sophisticated, faster, and increasingly difficult to detect. In this e-book learn how you can protect your web applications through 4 informative chapters.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Oracle Dyn

GHX Trusts Threat X to Secure and Optimize the Performance of the Largest Footprint in Healthcare Supply Chain
sponsored by ThreatX
CASE STUDY: GHX, a healthcare business and data automation company needed to ensure security in their health-care focused technology. Find out how GHX was able to successfully do so using Threat X's Intelligent Web Application Firewall solution.
Posted: 29 Aug 2018 | Published: 29 Aug 2018


Securing Web Applications Building a Strategy for Defense Against Malicious Bots
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Oracle Dyn

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how Duo used Signal Sciences for immediate application security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

2018 Threat Predictions
sponsored by Fortinet, Inc.
WHITE PAPER: As technology continues to evolve, there is a growing criminal element looking to exploit new opportunities the digital society brings. This white paper reveals predictions regarding the future threat landscape, offers insight into specific threats, and provides mitigation tactics to enhance security.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Fortinet, Inc.

Evolve Your Website Security
sponsored by DigiCert
WHITE PAPER: The growth of cybercrime is skyrocketing, which means advanced threats are putting website ecosystems at risk. Website security must be evolved in line with these growing challenges. Find out how to protect your organization's reputation against these threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018


Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018


Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

What to Look for in Web Fraud Detection Systems
sponsored by
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016

2018 Cybersecurity Report
sponsored by Cisco & Dimension Data
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Cisco & Dimension Data

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement