RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
HARDWARE LISTING:
NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks.
WHITE PAPER:
This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.
WHITE PAPER:
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
EZINE:
In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
WHITE PAPER:
Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
EGUIDE:
Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
EGUIDE:
Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
WHITE PAPER:
This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.