Web Server Threats and Countermeasures News
May 20, 2015
Google's new Chrome extension policy mandates that all users and developers must install web browser extensions from the Chrome Web Store.
January 30, 2015
PHP applications, including WordPress, are vulnerable to the GHOST Linux exploit, but overall the flaw may not be as dangerous as first thought.
September 11, 2014
Experts say the latest security breach of the Healthcare.gov website was caused by lacking security process maturity, downplaying the importance of website security testing.
June 25, 2014
NTP amplification had led to several recent massive DDoS attacks. Despite the good news, researchers say many other DDoS techniques remain unfixed.
Web Server Threats and Countermeasures Get Started
Bring yourself up to speed with our introductory content
Web server security is the protection of information assets that can be accessed from a Web server. Continue Reading
A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic to and from a Web application. Continue Reading
A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ... Continue Reading
Evaluate Web Server Threats and Countermeasures Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft is ending support for Windows Server 2003 in July 2015, yet many organizations will still run W2K3 beyond this date. Learn how to keep your enterprise safe. Continue Reading
HTTP/2 is close to becoming a formal Internet specification -- but how will it affect enterprise Web security? Expert Michael Cobb discusses how features, including compression and encryption, may help boost HTTP's safety. Continue Reading
Netflix released its own threat monitoring tools: Scumblr, Sketchy and Workflowable. Expert Joseph Granneman looks at these tools and their benefits to enterprises. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
As the world is forever being influenced by the introduction of the information age, technology and technological marvels have exceeded the...Continue Reading
With the granular control we can block strategically. WAN optimization with bigger disk space would be an improvement.Powered by IT Central Station
Valuable Features: I would have to say for the Web Filter, the best features for me are the application control, content filtering and the ease...Continue Reading
Technically good...too much administration required..one of the best reporting..poor customer supportPowered by IT Central Station
Valuable Features: Email web and DLP • Improvements to My Organization: Organisation of emails • Room for Improvement: Support ...Continue Reading
Manage Web Server Threats and Countermeasures
Learn to apply best practices and optimize your operations.
Denial-of-service attacks may be impossible to prevent, but that doesn't mean there aren't ways to protect Web applications from them. Continue Reading
Continuing with Windows Server 2003 after its end-of-life date is a problem waiting to happen. Michael Cobb offers pointers on an upgrade. Continue Reading
Man-in-the-middle attack defense requires careful, layered security. Michael Cobb reviews the tactics enterprises should employ to stay secure. Continue Reading
Problem Solve Web Server Threats and Countermeasures Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Application security expert Michael Cobb discusses the risks of Web browser extensions and what enterprises can do to counter browser plug-in threats. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use Nikto, a free and open source tool, to scan for outdated or vulnerable Web servers. Continue Reading
With Apache Web servers becoming ever more popular with attackers, organizations should follow Apache security best practices to avoid compromise. Continue Reading