websites

Results 126 - 150 of 199Sort Results By: Published Date | Title | Company Name

How to Detect SQL Injection & XSS Attacks

Published By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : 
alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem
    
AlienVault

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

How To Choose A Certificate Authority for Safer Web Security

Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities, security
    
GeoTrust

EQ2 2014: Responding to the Exploding Mobile Commerce Trend

Published By: Monetate     Published Date: Sep 30, 2014
Here’s a fact for you: Consumer use of mobile devices to access ecommerce websites has grown more than 120% in the last year. Though explosive growth in this category is a positive sign for the industry, the mobile customer is far different than any other.
Tags : 
mobile commerce, mobile trends, mobile devices, ecommerce
    
Monetate

Ten Best Practices for URL Filtering: Protect users from accessing malicious websites

Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee

IBM Mobile Web Push 30-day Trial / Interactive Demo / Marketplace 

Published By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : 
ibm, mobile, web push, free notifications, marketing, it management
    
IBM

Adobe Digital Index: Best of the Best Benchmark 2014

Published By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : 
online marketing, marketing practices, mobile usage trends
    
Adobe

Understanding the Legal Risks of Social Media: Advice from the Courts

Published By: Silk Road Technology     Published Date: Jul 30, 2014
Five years ago, many HR representatives put their hands over their ears and pretended they’d never heard the words “social media.” However, social media – which encompasses any internal or external online outlet that allows for two-way dialogue and includes websites such as blogs, Facebook, Instagram, LinkedIn, Pinterest, Twitter, Yelp, and YouTube – has only become more pervasive. In fact, according to Laura Friedel, a partner in Levenfeld Pearlstein’s Labor and Employment Practice Group, 75 percent of employees currently access social media on their mobile devices while at work and 67 percent do so more than twice a day.
Tags : 
silkroad, social media, legal risks, facebook, instagram, linkedin, pinterest, twitter
    
Silk Road Technology

The 2014 Mobile E-Commerce Strategy Playbook

Published By: Mobify     Published Date: Jul 22, 2014
Hoping to improve your Mobile ecommerce strategy and increase conversions? The 2014 Mobile E-Commerce Strategy Playbook will give you four strategic methods to increase mobile conversion rates, revenue and customer satisfaction.
Tags : 
mobile commerce, mcommerce, ecommerce, mobile shopping, m-commerce, e-commerce, retail, online retail
    
Mobify

Black Friday Mobile Commerce Success Guide

Published By: Mobify     Published Date: Jul 22, 2014
This Black Friday, 50% of traffic will be from mobile. Are you ready? This guide will give you actionable advice on how to capture your share of this year’s holiday spending spree. This guide gives you actionable advice to make the most out of the remaining time before Black Friday 2014 to optimize for higher conversions.
Tags : 
black friday, mobile commerce, mcommerce, ecommerce, mobile shopping, m-commerce, e-commerce, retail
    
Mobify

How to Leverage the Rise of Visual Social Media Channels

Published By: Curalate     Published Date: Jul 17, 2014
In today's visual web, consumers are sharing brands’ images at record pace, taking content from brands' websites and saving it to visual social media like Pinterest, where relevancy trumps recency. This behavior significantly extends the life of products, creating engagement with images long after they've been sold out or removed from brands' (digital) shelves. In fact, nearly 50% of Pinterest's top pins send users to expired product pages, dead links and 404 pages. This is a major, major red flag...
Tags : 
instagram marketing, pinterest marketing, tumblr marketing, visual marketing, pinterest analytics, instagram analytics, pinterest for business, instagram for business
    
Curalate

Why Symantec SSL?

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation

The Practical Guide to Choosing a DDoS Mitigation Service

Published By: Incapsula     Published Date: Jul 11, 2014
Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.
Tags : 
ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites
    
Incapsula

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

Adobe Digital Index: Best of the Best Benchmark 2014

Published By: Adobe     Published Date: May 15, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate
    
Adobe

IBM Mobile Web Push Interactive Demo

Published By: IBM     Published Date: Apr 22, 2014
Learn how your business can push targeted campaigns across your mobile, tablet and desktop websites in minutes in this interactive demo.
Tags : 
ibm, emm, smartphone, mobile, push notifications, push marketing, targeted campaigns, mobile device
    
IBM

18 Critical Steps to Prepare Your Site for Seasonal Traffic

Published By: PEER 1 Hosting     Published Date: Dec 16, 2013
A Peer1 Guide to Ramping up eCommerce Websites for the Holidays : 18 Critical Steps to Prepare Your Site for Seasonal Traffic.
Tags : 
peer 1 hosting, seasonal traffic, peer1 guide, ecommerce, website traffic, holiday revenues
    
PEER 1 Hosting

How to Extend HP UFT (QTP) to Test Mobile Apps an Websites

Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
Keynote

Audi Success Story

Published By: Adobe     Published Date: Nov 07, 2013
Audi differentiates its brand experience using web content and digital asset management capabilities in Adobe Experience Manager.
Tags : 
adobe, audi, audi cars, adobe marketing cloud, audi website, latest innovation, brand experience, head of brand portal
    
Adobe

From Content Management to Customer Experience Management

Published By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : 
adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management
    
Adobe

Adobe 2013 Mobile Consumer Survey Results

Published By: Adobe     Published Date: Nov 07, 2013
Using mobile sites, apps, and emerging technologies to build loyalty.
Tags : 
adobe, mobile consumer survey, mobile devices and tablets, digital marketers, market segmentation, tablet-specific strategies, mobile websites, applications
    
Adobe

5 Ways to Improve the Testing of Your Mobile Apps and Websites

Published By: Keynote     Published Date: Nov 05, 2013
Mobile testing requires a di¬fferent approach. This white paper takes an exhaustive look at challenges today in testing mobile apps and websites and why testing in the cloud can improve your ROI and efficiency.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
Keynote

Business Analytics for Marketing

Published By: IBM     Published Date: Oct 31, 2013
IBM Business Analytics help managers in different areas of the marketing organization do their jobs more effectively. Watch this video to see how: 1. Demand generation managers can target the most profitable customers with the right offer at the right time. 2.Marketing operations managers can review the results of multiple campaigns from a single marketing performance dashboard. 3. Brand managers can blend data from blogs, forums and social websites with CRM data to see how people really regard the company’s brand. Watch this video to see how IBM helps you make smarter marketing decisions, faster.
Tags : 
roi, return on investment, marketing analytics, performance analytics, business analytics, metrics, data, driver-based campaign
    
IBM

Personalized Marketing and Web Analytics

Published By: IBM     Published Date: Oct 15, 2013
How behavioral analytics fuels more personalized marketing
Tags : 
increasing marketing value, improve returns, optimize websites, personalized marketing, web analytics, provide specific insights, personalization process, web marketers
    
IBM

The Convergence Of Reputational Risk and IT Outsourcing

Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.