Website Security Reports

Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019

TechTarget ComputerWeekly.com

CW ASEAN: SD-WAN helps find best route to cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.
Posted: 08 Feb 2021 | Published: 12 Apr 2018

TechTarget ComputerWeekly.com

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
sponsored by Dell SonicWALL
EGUIDE: Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Dell SonicWALL

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Save Your Future Self With Security Now
sponsored by TechTarget Software Quality
EBOOK: Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016

TechTarget Software Quality

September CIO Decisions Ezine: Architecting a Nimble Enterprise
sponsored by TechTarget CIO
EZINE: Agile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?
Posted: 06 Sep 2013 | Published: 06 Sep 2013

TechTarget CIO

The four rules of complete web protection
sponsored by Sophos
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos