Web Server Threats and Countermeasures News
January 30, 2015
PHP applications, including WordPress, are vulnerable to the GHOST Linux exploit, but overall the flaw may not be as dangerous as first thought.
September 11, 2014
Experts say the latest security breach of the Healthcare.gov website was caused by lacking security process maturity, downplaying the importance of website security testing.
June 25, 2014
NTP amplification had led to several recent massive DDoS attacks. Despite the good news, researchers say many other DDoS techniques remain unfixed.
March 19, 2014
Security vendor Imperva says thousands of enterprise Web servers are exposed to an easy-to-exploit PHP flaw despite a patch long being available.
Web Server Threats and Countermeasures Get Started
Bring yourself up to speed with our introductory content
A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic to and from a Web application. Continue Reading
A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ... Continue Reading
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Continue Reading
Evaluate Web Server Threats and Countermeasures Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Netflix released its own threat monitoring tools: Scumblr, Sketchy and Workflowable. Expert Joseph Granneman looks at these tools and their benefits to enterprises. Continue Reading
Continuing with Windows Server 2003 after its end-of-life date is a problem waiting to happen. Michael Cobb offers pointers on an upgrade. Continue Reading
Rob Shapland explains how to achieve SSL certificate security and select the certificate that will best ensure the trust of your organization's users. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
As the world is forever being influenced by the introduction of the information age, technology and technological marvels have exceeded the...Continue Reading
With the granular control we can block strategically. WAN optimization with bigger disk space would be an improvement.Powered by IT Central Station
Valuable Features: I would have to say for the Web Filter, the best features for me are the application control, content filtering and the ease...Continue Reading
Technically good...too much administration required..one of the best reporting..poor customer supportPowered by IT Central Station
Valuable Features: Email web and DLP • Improvements to My Organization: Organisation of emails • Room for Improvement: Support • Use...Continue Reading
Manage Web Server Threats and Countermeasures
Learn to apply best practices and optimize your operations.
Denial-of-service attacks may be impossible to prevent, but that doesn't mean there aren't ways to protect Web applications from them. Continue Reading
Man-in-the-middle attack defense requires careful, layered security. Michael Cobb reviews the tactics enterprises should employ to stay secure. Continue Reading
Data from Arbor Networks shows an increase in DNS amplification attacks and application-layer DDoS attacks. Continue Reading
Problem Solve Web Server Threats and Countermeasures Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Application security expert Michael Cobb discusses the risks of Web browser extensions and what enterprises can do to counter browser plug-in threats. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use Nikto, a free and open source tool, to scan for outdated or vulnerable Web servers. Continue Reading
With Apache Web servers becoming ever more popular with attackers, organizations should follow Apache security best practices to avoid compromise. Continue Reading