Download now Free registration required
The next time a company claims that it's "Web 2.0," test their features against the list above. The more points they score, the more they are worthy of the name. However, that as Web 2.0 technologies are fairly new and although their value and usefulness are increasing daily, so are the security exposures that they bring. Reap the benefits these next-generation technologies offer, but ensure that networks are protected with a solid Web security strategy to combat the vast range of cyber-based threats that are associated with the use of these Web 2.0 sites and applications.
- Format: PDF
- Size: 93.4 KB