• What are the hidden mobile app security threats to look out for?

    Mobile app security is a newer field than even Web security. But there are similar gotchas and some common threats that we're already managing.

    Kevin Beaver19,520 pointsBadges:
  • Web security problems: Five ways to stop login weaknesses

    An IT security expert dissects Web application authentication and login weaknesses and shows some ways to avoid security problems they cause.

    Kevin Beaver19,520 pointsBadges:
  • Web security features of Internet Explorer 8

    Internet Explorer 8 will go a long way toward solidifying various Web standards, but it lacks significant improvements in security. Learn about domain highlighting and other changes in this tip.

    Brien Posey11,735 pointsBadges:
  • Security services for each Web environment layer

    What are your options for Web security? Security is based on the control layers in the Web application environment, and you have many security options at each layer.

    JMason11,090 pointsBadges:
  • Need Web services security? Dig into WSE 3.0 for Microsoft .NET

    Web Services Enhancements 3.0 lets developers add digital signatures, policy-driven security and bulk binary data transfers for Web services built atop the .NET Framework.

    Etittel4,750 pointsBadges:
  • Network devices simplifying integration, Web services security

    Cisco's planned foray into application-oriented networking helps elevate the work of the early pioneers.

    SearchSOA.com5,255 pointsBadges:
  • The man behind the Month of Search Engine Bugs speaks

    Ukrainian security researcher Eugene Dokukin, more widely known by his online name MustLive, is about to launch a new "Month-of" flaw disclosure project focusing on search engine bugs, at a time when many security professionals are dismissing such projects as shameless publicity. In an interview...

    SearchCIOMidmarket9,485 pointsBadges:
  • Best of Web security 2013

    Readers pick the top Web security products in 2013: Inbound and outbound content filtering, URL filtering and application control (IM, P2P).

    ITKE371,805 pointsBadges:
  • Web security firm ranks Firefox, Safari browsers as flaw prone

    Penetration testing firm Cenzic says Mozilla Firefox and the Apple Safari browsers contain the most vulnerabilities in a study covering the first half of 2009.

    searchsecurity23,410 pointsBadges:
  • What will the HSTS protocol mean for Web security?

    Matthew Pascucci discusses what effect the new HSTS protocol could have on Web security and on preventing man-in-the-middle attacks.

    searchsecurity23,410 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.