IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application Security White Papers (View All Report Types)
1 - 25 of 137 Matches Previous Page  |  Next Page
WaaS offers the ability to effectively and securely manage all end users, their devices, compliant workloads and more
sponsored by Matrix42
WHITE PAPER: This white paper provides evaluation criteria for workspace aggregators. Read now to learn how to effectively and securely manage all end users, their devices, compliant workloads, and more.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by Threat Track Security
WHITE PAPER: This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
Posted: 21 May 2015 | Published: 29 Apr 2015

Threat Track Security

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

DNS Software Drives Network Economics
sponsored by Nominum, Inc.
WHITE PAPER: Access this white paper to learn the benefits of updating DNS for service providers. Continue reading and uncover best practices for choosing and operating DNS software.
Posted: 15 May 2015 | Published: 25 Feb 2015

Nominum, Inc.

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Securing Cloud Computing: How to Evaluate Providers
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, explore the state of security in the cloud. Continue reading to reveal a 21 questions-to-ask checklist of leading security practices for protecting sensitive data in the cloud.
Posted: 14 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Next Generation Cloud Security
sponsored by Symantec
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec

Secure Code and the Role of Software Assurance
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores why application security has not kept pace with changes in the threat landscape and why companies struggle to create secure code.
Posted: 12 May 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Web App Security Top 10 Risk Mitigation Techniques
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper lays out the top 10 challenges of and threats to web app security. View now to learn the corresponding 10 risk mitigation techniques to protect web apps.
Posted: 01 May 2015 | Published: 05 Mar 2014

Fortinet, Inc.

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

Today's Top Security Risks Revealed
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.
Posted: 28 Apr 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

Integrating App Security into the Development Lifecycle
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores how to combat cybercriminals by integrating security into the software development lifecycle and offers strategies and best practices to ensure success.
Posted: 23 Apr 2015 | Published: 14 Jan 2015

Hewlett-Packard Company

Continuous Monitoring: A New Approach to Proactively Protecting your Global Perimeter
sponsored by Qualys
WHITE PAPER: This white paper examines the need for continuous monitoring. Access now to explore a blueprint to improving your network security strategy and how to identify and address potential threats enabled by vulnerabilities in software or systems.
Posted: 21 Apr 2015 | Published: 13 Aug 2014

Qualys

Narrowing The Security Gap With Automated Configuration Assessment
sponsored by Qualys
WHITE PAPER: This white paper outlines the three best practices to controlling incorrect app configurations and how to minimize risks.
Posted: 20 Apr 2015 | Published: 28 Jan 2015

Qualys

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

5 Days to Setting Up an Application Security Program
sponsored by White Hat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 15 Apr 2015 | Published: 12 Jan 2015

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys
1 - 25 of 137 Matches Previous Page    1 2 3 4    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement