IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application Security Reports
1 - 25 of 246 Matches Previous Page  |  Next Page
Anywhere Access to SAP Applications
sponsored by Citrix
WHITE PAPER: This white paper explores how to enable your workforce to universally access SAP applications while centralizing management for increased security.
Posted: 24 Jun 2015 | Published: 07 May 2014

Citrix

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

The Importance of Multi-Layered Web Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines the importance of having a multi-layered Web security approach in today's quickly evolving online market. Access now and uncover what you can do to ensure your Web security strategy is as effective and adaptive as it should be.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

The Evolving Role Of Cloud Security: Understanding Why A New Approach Is Needed
sponsored by Cloud Sherpas
WHITE PAPER: The way forward will lead the security industry of tomorrow in one of two very different directions: The top-down approach of IT pushing back against user autonomy, or the opposite approach, where empowerment and user agency are balanced by behavior analytics and risk measurement policy.
Posted: 08 Jun 2015 | Published: 20 May 2015

Cloud Sherpas

Playtech case study: Predictive monitoring tools deliver game-changing uptime
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to see how automated, integrated monitoring tools helped Playtech monitor web applications predictively to further protect uptime, user experience, and revenue.
Posted: 02 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

WaaS offers the ability to effectively and securely manage all end users, their devices, compliant workloads and more
sponsored by Matrix42
WHITE PAPER: This white paper provides evaluation criteria for workspace aggregators. Read now to learn how to effectively and securely manage all end users, their devices, compliant workloads, and more.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

What Is the Right Web Application Assessment for You?
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide examines the pros and cons of several low cost web app security testing tools and offers insight into choosing the right one for the job. Continue reading to learn if a security assessment termed "compliance ready" is too good to be true.
Posted: 22 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Best Practices for Avoiding Application Security Vulnerabilities
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide presents the 5 most common web app vulnerabilities and best practices to avoid them.
Posted: 22 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Avoid Breaches: Cloud-Based Application Security
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide reveals the 3 key best practices for preventing cloud-app security breaches and patching vulnerabilities. Learn how to use such technologies as encryption, sandboxing, and log monitoring to ensure data protection.
Posted: 22 May 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

SQL Injection: How to Sidestep the Oldest Hacking Trick in the Books
sponsored by EE
WHITE PAPER: In this white paper, gain insight into the basics of SQL injection attacks and why hackers haven't retired it yet. Continue reading to learn what steps to take to close easily exploitable vulnerabilities in your security strategy.
Posted: 20 May 2015 | Published: 06 May 2015

EE

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Securing Cloud Computing: How to Evaluate Providers
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, explore the state of security in the cloud. Continue reading to reveal a 21 questions-to-ask checklist of leading security practices for protecting sensitive data in the cloud.
Posted: 14 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Next Generation Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Cloud Identity Access: Bridging the Gap between IT and Users
sponsored by Symantec Corporation
RESOURCE: Organizations are struggling to secure rogue cloud apps as users work remotely on a myriad of devices.  This white paper presents the challenges of securing cloud apps data and offers insights into facilitating harmony between users and IT.
Posted: 12 May 2015 | Published: 25 Mar 2015

Symantec Corporation

Secure Code and the Role of Software Assurance
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores why application security has not kept pace with changes in the threat landscape and why companies struggle to create secure code.
Posted: 12 May 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

Keeping Applications Safe with Whitelisting
sponsored by Digital Guardian
EGUIDE: This e-guide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.
Posted: 27 Apr 2015 | Published: 08 Apr 2015

Digital Guardian

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com
1 - 25 of 246 Matches Previous Page    1 2 3 4    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement