Searched for: "report on web application firewall"
- Security (17)
- Microsoft (10)
- Networking (7)
- Enterprise Software (5)
- Collaboration (4)
- Data Centers (4)
- Data Management (4)
- Developer (3)
- Windows (3)
- Cxo (2)
- Mobility (2)
- After Hours (1)
- Cisco (1)
- E-Commerce (1)
- Emerging Tech (1)
- Hardware (1)
- It Employment (1)
- It Policies (1)
- Open Source (1)
- Project Management (1)
- Servers (1)
- Smartphones (1)
About 72 results for "report on web application firewall"
Gartner analysts suggest you keep a close eye on the items listed in its latest trend report. Michael Kassner examines the technologies on the list and finds a common thread: cloud...
APTs (Advanced Persistent Threats) are still on the rise, forcing organizations to rethink their best practices to deal with the new challenges that APTs present to enterprise secu...
A password change might now always be reflected right away when accessing email on a mobile device via Activesync. Find out why and what you should know about this process.
Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and abi...
Jeff Cerny talks with Peter Price, the co-founder and CEO of Webalo about the effect of BYOD on the enterprise.
Enhanced Architecture for Misconfiguration and Intrusion Detection Using Centralized Rule Based System
Web servers and web-based applications are popular attack targets. Web servers are usually accessible through corporate firewalls. The number of reported web application vulnerabil...
Guest contributor Rafael Akchurin of QuintoLabs presents this how-to article on setting up web content filtering on Squid Proxy.
Patrick Lambert looks at the limited usefulness of smartphone antivirus apps. Should you bother with it?
Nick Hardiman explains his thinking behind creating a Drupal CMS installation on his Amazon Web Service. Here is why he likes Drupal.
SANS Institute: Oracle Database Firewall Review - Monitoring and Blocking SQL Injection Attacks and Other Threats
Most external-based attacks are conducted through SQL injection, one of the top four methods of hacking into websites and a top method of hacking into backend databases, according ...