Searched for: "best practices use of web application firewalls"
- Microsoft (12)
- Security (12)
- Networking (10)
- Cxo (5)
- Open Source (5)
- Collaboration (4)
- Enterprise Software (4)
- Project Management (4)
- Data Centers (3)
- Printers (2)
- After Hours (1)
- Apple (1)
- Asean (1)
- Banking (1)
- Big Data (1)
- Cloud (1)
- Developer (1)
- E-Commerce (1)
- Social Enterprise (1)
- Software (1)
- Tech & Work (1)
About 72 results for "best practices use of web application firewalls"
In the wake of the Sony Pictures hack, many in IT are suggesting that trends to "liberalize" access to external technologies is partially to blame. Should IT go back to being the "...
Enterprise IT workloads are diverse, and CliQr Technologies wants to enable companies to better manage applications with the cloud of their choice.
The lowly bot has evolved into something that can in fact be an agent of malicious intent.
18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream.
APM concerns are forcing network managers to install newer technologies to deal with increasing traffic demands. But these solutions may hide security issues and other attacks.
Jesus Vigo walks you through the steps of configuring VPN services in Apple's OS X Server.
Private cloud projects are being deployed all over Asia. Some of the largest deployments are effectively supporting both enterprise application architectures and web-scale applicat...
Alfonso Barreiro offers an overview of EMET -- Microsoft's free Enhanced Mitigation Experience Toolkit -- that applies anti-exploit tech to vulnerable applications and processes.
When you get a new PC, one of the first things you want to do is connect it to the Internet. But that is a very bad idea. We list 10 things you need to do to prepare your new PC fo...
Not all Linux books are created equal. Some are amazingly good, and definitely worth buying. Others are a waste of money. Three specimens identified in this article are of the latt...