Countdown to Windows Server 2003 end of life planning

Web Server Threats and Countermeasures

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe. 

  • Best practices for managing secure Web server configurations

    In this tip, Michael Cobb, our Web security guru takes an in-depth look at ways to manage securing configurations of multiple Web servers. He explains the process from frequency to documentation and replication. 

  • Apple patches 13 flaws in Mac OS X

    Attackers could gain unauthorized system access, compromise sensitive data and launch malcode by exploiting a series of security holes in Mac OS X. But patches are available. 

  • Websense Enterprise 5.5

    Learn why Information Security magazine believes this product is ideal for organizations who need an robust Internet filtering solution. 

  • What is required to deploy Web server application in MS Application Center

    In this Ask the Expert Q&A, our application security expert examines whether or not it's possible to exclude X.509 certificates and private keys if you use MS Application Center to deploy a Web server application. 

  • Best practices for protecting handhelds from mobile malware

    Mobile malware such as the Cabir worm and Dust virus indicate that it's a good idea to put sound handheld security practices in place now, although antivirus software for handhelds and mobile phones may not be worth the investment. 

  • Group seeks to bolster VoIP security

    An industry coalition has published a lengthy list of guidelines to help identify and deal with threats against Internet voice communications systems. 

  • Reporter's Notebook: NYC 'controls the software industry'

    At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. 

  • Building trust into mobile computing

    The Trusted Computing Group unveiled "use-cases" that describe secure ways in which to implement features and functions of mobile devices. 

  • Apache fixes pair of Web server flaws

    Update: The vulnerabilities, fixed in newer versions of HTTP Server, could affect nearly seven out of 10 Web sites on the Internet. However, an analyst suggests they are likely low-risk.