Internet Application Security White Papers

(View All Report Types)
Why Traditional Anti-Malware Solutions Are No Longer Enough
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
Posted: 17 Nov 2009 | Published: 17 Nov 2009

AVG Technologies USA, Inc.

Cloud Computing for the Enterprise-- Part 3: Using WebSphere CloudBurst to Create Private Clouds
sponsored by IBM
WHITE PAPER: Read this article to get an introduction to WebSphere CloudBurst and WebSphere Application Server Hypervisor Edition and discover how these new offerings bring the significant advantages of private cloud computing to WebSphere enterprise environments.
Posted: 21 Sep 2010 | Published: 21 Sep 2010

IBM

Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities
sponsored by IBM
WHITE PAPER: Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.
Posted: 10 Mar 2010 | Published: 01 Sep 2008

IBM

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

 Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM