• Beyond the Page: Web security meets DDoS

    As DDoS attacks become more sophisticated it gets harder to detect and defend against them. John Pescatore describes new DDoS attack vectors and discusses incident response planning to combat these attacks today.

    ComputerWeekly725 pointsBadges:
  • Security Readers’ Choice Awards 2014: Web security products

    Readers vote on the best Web security of 2014.

    ITKE355,660 pointsBadges:
  • New attack methods target Web 2.0, VoIP

    Researchers have found new evidence that attackers are targeting Web 2.0 applications and VoIP with increased vigor. Companies are ill-prepared to meet the threat, they say.

    082670300 pointsBadges:
  • Defending against Internet security threats and attacks

    From buffer overflows to cross-site scripting, Web threats are many. Security researchers at Information Security Decisions 2008 discuss how to keep enterprises safe from these attacks (part 2 of 4).

    ITKE355,660 pointsBadges:
  • Web Security School Entrance Exam Answers

    Web Security School Entrance Exam Answers

    ITKE355,660 pointsBadges:
  • Why use POST vs. GET to keep applications secure

    Although POST and GET HTTP requests essentially perform the same command on a Web server, a security expert says there are inherent dangers in using one over the other. Learn why one type of processing request provides more security for your Web application in this expert tip.

    Kevin Beaver18,510 pointsBadges:
  • Web security issues (and how a secure Web gateway can solve them)

    Did you know a secure Web gateway can combat Web security issues such as malware, unapproved application use and social media threats?

    searchsecurity22,100 pointsBadges:
  • What are the hidden mobile app security threats to look out for?

    Mobile app security is a newer field than even Web security. But there are similar gotchas and some common threats that we're already managing.

    Kevin Beaver18,510 pointsBadges:
  • Web security problems: Five ways to stop login weaknesses

    An IT security expert dissects Web application authentication and login weaknesses and shows some ways to avoid security problems they cause.

    Kevin Beaver18,510 pointsBadges:
  • Web security features of Internet Explorer 8

    Internet Explorer 8 will go a long way toward solidifying various Web standards, but it lacks significant improvements in security. Learn about domain highlighting and other changes in this tip.

    Brien Posey10,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.