Internet Security Research
-
Web Browser Security Features Make Attacks Harder
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
-
Web-Facing Applications: Mitigating Likely Web Application Threats
Sponsored by: TechTarget SecurityIn this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Exploring New Features, Uses for Secure Web Gateway Appliances
Sponsored by: TechTarget SecurityIn this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
-
How SSL-Encrypted Web Connections are Intercepted
Sponsored by: TechTarget SecurityIn this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: TechTarget SecurityThis expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
-
The Pros and Cons of Delivering Web Pages Over an SSL Connection
Sponsored by: TechTarget SecurityThough Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
-
Managing Web Security in an increasingly Challenging Threat Landscape
Sponsored by: TechTarget SecurityIn this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
Sponsored by: TechTarget SecurityThis expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
September CIO Decisions Ezine: Architecting a Nimble Enterprise
Sponsored by: TechTarget CIOAgile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
Sponsored by: OpenText Security SolutionsThis case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Managing Web Security in an Increasing Challenging Threat Landscape
Sponsored by: TechTarget SecurityThis resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
-
Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
Sponsored by: OpenText Security SolutionsThis resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
-
How Web Security Improves Productivity and Compliance
Sponsored by: OpenText Security SolutionsThis resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
-
How Web Security Improves Productivity and Compliance
Sponsored by: OpenText Security SolutionsThis resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
-
Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
Sponsored by: OpenText Security SolutionsThis case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
-
Advanced Identity Tracking for Social Networking Sites
Sponsored by: Hewlett Packard EnterpriseThis resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: Thawte Inc.This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
-
Web Browser Security Features Make Attacks Harder
Sponsored by: Symantec CorporationIn this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: Thawte Inc.Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
-
ISM December 2012
Sponsored by: TechTarget SecurityIn this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
-
E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
Sponsored by: Dell SonicWALLUncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
-
Secure Web Gateway Overview: Implementation Best Practices
Sponsored by: SophosThis expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.