Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Secure Computing > Web 2.0 Security Risks. Are you protected?
 

Web 2.0 Security Risks. Are you protected?

White Paper Published By: Secure Computing
Secure Computing
Published:  Feb 22, 2007
Type:  White Paper
Length:  9 pages

This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.



Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security