Q&A with Aaron Turner: Whitelisting is on enterprise blacklist

Securing Productivity Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Insider edition: Web application security

    Developers building Web applications don’t give enough consideration to security. Often in a rush to get apps live, they’re pushed into production with glaring vulnerabilities that attacks can easily exploit, often in an automated manner. This Inside... 

  • Application hardening: Evolving techniques for proactive enterprise application security

    Enterprises are now running more and more applications to meet the demands of employees and users. This makes developing a threat and vulnerability management program to secure applications increasingly important. This TechGuide covers proactive tech... 

  • Technical guide to secure collaboration software

    TechTarget's Security Media Group presents a comprehensive guide to secure collaboration software. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice ... 

  • Application security guide: Scanning production applications

    This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue read...