Web Security Tools and Best Practices News
March 20, 2015
News roundup: Researchers at the 2015 Pwn2Own exploited every major Web browser, casting doubt on browser security once again. Plus: high-severity OpenSSL update; IE being phased-out in Windows 10; Americans dodging online surveillance.
March 06, 2015
News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.
January 23, 2015
News roundup: An of onslaught Adobe, Oracle, OpenSSL, Chrome and Firefox patches highlights the sad state of software security in 2015. Plus, security budgets increasing; HealthCare.gov security woes; false-positive alerts cost millions annually.
April 28, 2014
The IE zero-day, first spotted by FireEye, is being actively exploited in the wild. US-CERT recommends avoiding IE until a fix is released.
Web Security Tools and Best Practices Get Started
Bring yourself up to speed with our introductory content
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading
The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. Continue Reading
This security school lesson details the myriad of Web application attacks in circulation today, providing detailed explanations of SQL injection attacks, clickjacking, cross-site scripting and cross-site request forgery attacks and other Web-based ... Continue Reading
Evaluate Web Security Tools and Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Read about new antimalware strategies and readers' 2012 priorities in this issue of Information Security magazine. Continue Reading
Product ReviewsPowered by IT Central Station
With the granular control we can block strategically. WAN optimization with bigger disk space would be an improvement.Powered by IT Central Station
Valuable Features: I would have to say for the Web Filter, the best features for me are the application control, content filtering and the ease...Continue Reading
Technically good...too much administration required..one of the best reporting..poor customer supportPowered by IT Central Station
Valuable Features: Email web and DLP • Improvements to My Organization: Organisation of emails • Room for Improvement: Support • Use...Continue Reading
Powered by IT Central Station
Valuable Features: We chose Cisco Iron Port as it delivers strong email security protection and our company needed it to protect the company's...Continue Reading
Problem Solve Web Security Tools and Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb provides background on the RC4 encryption algorithm and determines whether a recent RC4 attack signals trouble for SSL/TLS users. Continue Reading
Expert Michael Cobb discusses how to prevent SQL injection attacks by validating user input and utilizing parameterized stored procedures. Continue Reading
The Internet Explorer 8 XSS filter can assist in cross-site scripting prevention. Michael Cobb explains how it works in this expert response. Continue Reading