IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

Q2, 2019 Cyberthreats & Trends Report
sponsored by Neustar
ANALYST REPORT: While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.
Posted: 19 Aug 2019 | Published: 12 Aug 2019

Neustar

Build a Strategic Approach to Network and App Security
sponsored by Citrix
EBOOK: In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

Citrix

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Web Browser-Based Attacks
sponsored by Morphisec, Inc.
RESOURCE: Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Morphisec, Inc.

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Why Web Performance Matters
sponsored by Cloudflare
VIDEO: Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.
Posted: 23 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
EBOOK: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

2018 Threat Report
sponsored by CenturyLink
WHITE PAPER: As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.
Posted: 01 May 2019 | Published: 01 May 2019

CenturyLink
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement