Web Security Tools and Best Practices News
April 10, 2015
Protecting a Web application increasingly means tuning your protections to the individual characteristics of your applications. There’s more than one way to go about this, though. In this three-part guide we review best practices for taking your Web...
March 20, 2015
News roundup: Researchers at the 2015 Pwn2Own exploited every major Web browser, casting doubt on browser security once again. Plus: high-severity OpenSSL update; IE being phased-out in Windows 10; Americans dodging online surveillance.
March 06, 2015
News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.
January 23, 2015
News roundup: An of onslaught Adobe, Oracle, OpenSSL, Chrome and Firefox patches highlights the sad state of software security in 2015. Plus, security budgets increasing; HealthCare.gov security woes; false-positive alerts cost millions annually.
Web Security Tools and Best Practices Get Started
Bring yourself up to speed with our introductory content
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading
The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. Continue Reading
This security school lesson details the myriad of Web application attacks in circulation today, providing detailed explanations of SQL injection attacks, clickjacking, cross-site scripting and cross-site request forgery attacks and other Web-based ... Continue Reading
Evaluate Web Security Tools and Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Read about new antimalware strategies and readers' 2012 priorities in this issue of Information Security magazine. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
As the world is forever being influenced by the introduction of the information age, technology and technological marvels have exceeded the...Continue Reading
With the granular control we can block strategically. WAN optimization with bigger disk space would be an improvement.Powered by IT Central Station
Valuable Features: I would have to say for the Web Filter, the best features for me are the application control, content filtering and the ease...Continue Reading
Technically good...too much administration required..one of the best reporting..poor customer supportPowered by IT Central Station
Valuable Features: Email web and DLP • Improvements to My Organization: Organisation of emails • Room for Improvement: Support • Use...Continue Reading
Problem Solve Web Security Tools and Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb provides background on the RC4 encryption algorithm and determines whether a recent RC4 attack signals trouble for SSL/TLS users. Continue Reading
Expert Michael Cobb discusses how to prevent SQL injection attacks by validating user input and utilizing parameterized stored procedures. Continue Reading
The Internet Explorer 8 XSS filter can assist in cross-site scripting prevention. Michael Cobb explains how it works in this expert response. Continue Reading