Web Security Reports

CW Benelux November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 08 Feb 2021 | Published: 09 Nov 2017

TechTarget ComputerWeekly.com

CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
sponsored by TechTarget ComputerWeekly.com
EZINE: Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
Posted: 23 Nov 2022 | Published: 08 Dec 2022

TechTarget ComputerWeekly.com

WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by TechTarget Security
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

TechTarget Security

Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Symantec Corporation

The Tangled Web of Data Privacy Issues
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

Thawte Inc.

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise