IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats White Papers (View All Report Types)
Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Avoid BYO Policy and Security Pitfalls By Addressing Mobile Threats
sponsored by Citrix
WHITE PAPER: This white paper highlights the legal risks of personally owned technology, and offers policy recommendations and mitigating technology solutions to protect business information. Examine 5 practical case studies to help you recognize and address potential threats from using personal devices at work.
Posted: 28 Oct 2015 | Published: 30 Sep 2014


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

6 Threats to Holiday Website Shopping (and 2 Self- Inflicted Wounds)
sponsored by Neustar®
WHITE PAPER: View this white paper to see the top 6 cybersecurity threats that are magnified during the holiday season from the hacker's point of view.
Posted: 09 Oct 2015 | Published: 30 Sep 2015


Understanding the Seven Stages of Advanced Threats
sponsored by Raytheon|Websense
WHITE PAPER: This white paper outlines the seven steps of an advanced attack and suggests ways to defend your organization at each stage.
Posted: 14 Sep 2015 | Published: 31 Dec 2013


Enabling the Connected Campus: Mobility Best Practices for Higher Education
sponsored by VMware, Inc.
WHITE PAPER: IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

VMware, Inc.

Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement