Lessons learned from HealthCare.gov security issues

Web Application and Web 2.0 Threats

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Web security benchmarks

    Learn how to increase your security posture and what resources are available to security admininstrators who want to quickly ramp up their posture of their protected systems. 

  • Integrated content filtering

    Learn what fundamental questions you should ask when evaluating content-filtering solutions for your enterprise. 

  • The pros and cons of application firewalls

    In this Ask the Expert Q&A, our application security expert discusses the pros and cons of application firewalls. He also explains how they differ from packet filter and stateful inspection firewalls, and why they are not the preferred among some org... 

  • IronPort C-Series Messaging Gateway

    Learn why Information Security magazine thinks this tool has an edge among antispam products 

  • MXtreme Mail Firewall 4.0

    Learn how Borderware Technologies' Mxtreme Mail Firewall combines e-mail security with advanced administration and policy management. 

  • Avinti iSolation Server 1.1

    Learn why Information Security magazine believes the Avinti iSolation Server 1.1 is a promising technology. 

  • eSafe 4.0

    Information Security magazine reviews the strengths and weakness of eSafe's new content-filtering solution. 

  • UPDATED: Zotob exploits Microsoft Windows flaw

    Security experts are worried by how fast Zotob was developed to exploit Microsoft Windows' Plug and Play flaw. A more damaging worm could be launched with equal speed. 

  • IIS vs. Apache: Which is the right security choice?

    From vulnerabilities to administrator and developer skills, this tip analyzes the risks and benefits to weigh when selecting the right Web server for your organization. 

  • How to reduce risks with URL filtering

    Learn how to protect your network from threats by controlling the URLs that enter and leave it.