Web Security Reports

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

CW Nordics August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 08 Feb 2021 | Published: 24 Aug 2017

TechTarget ComputerWeekly.com

CW Benelux May 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
Posted: 08 Feb 2021 | Published: 01 May 2018

TechTarget ComputerWeekly.com

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER: This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011

Neustar®

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by TechTarget Security
EGUIDE: Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

TechTarget Security

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by TechTarget Security
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

TechTarget Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva