• New attack methods target Web 2.0, VoIP

    Researchers have found new evidence that attackers are targeting Web 2.0 applications and VoIP with increased vigor. Companies are ill-prepared to meet the threat, they say.

    082670300 pointsBadges:
  • Defending against Internet security threats and attacks

    From buffer overflows to cross-site scripting, Web threats are many. Security researchers at Information Security Decisions 2008 discuss how to keep enterprises safe from these attacks (part 2 of 4).

    ITKE361,975 pointsBadges:
  • Web Security School Entrance Exam Answers

    Web Security School Entrance Exam Answers

    ITKE361,975 pointsBadges:
  • Why use POST vs. GET to keep applications secure

    Although POST and GET HTTP requests essentially perform the same command on a Web server, a security expert says there are inherent dangers in using one over the other. Learn why one type of processing request provides more security for your Web application in this expert tip.

    Kevin Beaver18,815 pointsBadges:
  • Web security issues (and how a secure Web gateway can solve them)

    Did you know a secure Web gateway can combat Web security issues such as malware, unapproved application use and social media threats?

    searchsecurity22,640 pointsBadges:
  • What are the hidden mobile app security threats to look out for?

    Mobile app security is a newer field than even Web security. But there are similar gotchas and some common threats that we're already managing.

    Kevin Beaver18,815 pointsBadges:
  • Web security problems: Five ways to stop login weaknesses

    An IT security expert dissects Web application authentication and login weaknesses and shows some ways to avoid security problems they cause.

    Kevin Beaver18,815 pointsBadges:
  • Web security features of Internet Explorer 8

    Internet Explorer 8 will go a long way toward solidifying various Web standards, but it lacks significant improvements in security. Learn about domain highlighting and other changes in this tip.

    Brien Posey10,860 pointsBadges:
  • Security services for each Web environment layer

    What are your options for Web security? Security is based on the control layers in the Web application environment, and you have many security options at each layer.

    JMason11,090 pointsBadges:
  • Need Web services security? Dig into WSE 3.0 for Microsoft .NET

    Web Services Enhancements 3.0 lets developers add digital signatures, policy-driven security and bulk binary data transfers for Web services built atop the .NET Framework.

    Etittel4,750 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following