IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 
Definition continues below.
Web Application Security Reports
1 - 25 of 246 Matches Previous Page  |  Next Page
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This webcast explores watering hole attacks and how to detect them before vulnerabilities are exploited.
Posted: 03 Aug 2015 | Premiered: Jul 8, 2015

AlienVault

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Intro to Mobile App Management: App Security from the Onset
sponsored by IBM
WHITE PAPER: This white paper, the first in an installment of three, explores how to create a successful app security strategy from the beginning.
Posted: 16 Jul 2015 | Published: 24 Jun 2015

IBM

Anywhere Access to SAP Applications
sponsored by Citrix
WHITE PAPER: This white paper explores how to enable your workforce to universally access SAP applications while centralizing management for increased security.
Posted: 24 Jun 2015 | Published: 07 May 2014

Citrix

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Playtech case study: Predictive monitoring tools deliver game-changing uptime
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to see how automated, integrated monitoring tools helped Playtech monitor web applications predictively to further protect uptime, user experience, and revenue.
Posted: 02 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

Website Defense in Depth – Examining the Protect, Detect, React Paradigm
sponsored by Distil Networks
WHITE PAPER: This white paper explores the Protect, Detect, React paradigm in depth and compares several platforms for specific security levels and requirements.
Posted: 27 May 2015 | Published: 25 Mar 2015

Distil Networks

WaaS offers the ability to effectively and securely manage all end users, their devices, compliant workloads and more
sponsored by Matrix42
WHITE PAPER: This white paper provides evaluation criteria for workspace aggregators. Read now to learn how to effectively and securely manage all end users, their devices, compliant workloads, and more.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

SQL Injection: How to Sidestep the Oldest Hacking Trick in the Book
sponsored by EE
WHITE PAPER: This white paper provides insight into the basics of SQL injection attacks and discusses why it continues to be one of the most common forms of cyber-attack.
Posted: 20 May 2015 | Published: 06 May 2015

EE

Next Generation Cloud Security
sponsored by Symantec Corporation
DATA SHEET: In this data sheet, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Cloud Identity Access: Bridging the Gap between IT and Users
sponsored by Symantec Corporation
RESOURCE: Organizations are struggling to secure rogue cloud apps as users work remotely on a myriad of devices. This infographic presents the challenges of securing cloud apps data and offers insights into facilitating harmony between users and IT.
Posted: 12 May 2015 | Published: 25 Mar 2015

Symantec Corporation

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

The Importance of Secure Application Development Lifecycles
sponsored by White Hat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

White Hat Security

Best Practices for Web Application Security
sponsored by White Hat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 06 May 2015 | Published: 06 May 2015

White Hat Security

Keeping Applications Safe with Whitelisting
sponsored by Digital Guardian
EGUIDE: This e-guide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.
Posted: 27 Apr 2015 | Published: 08 Apr 2015

Digital Guardian

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

5 Days to Setting Up an Application Security Program
sponsored by White Hat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 15 Apr 2015 | Published: 12 Jan 2015

White Hat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
1 - 25 of 246 Matches Previous Page    1 2 3 4    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  can run JavaScript hosted on a different domain. For example, in a Web-based e-mail application that uses Ajax, an attacker can log in as the legitimate user. All of the contents of the e-mail inbox and address book then become available to the hacker. In addition, the hacker may send bogus e-mail messages in the name of the victim.Ajax is a method of building interactive Web applications by combining several programming tools including JavaScript, which can cause a linked-to page to appear (or fail to appear) in a pop-up, hide the status bar, change text in the status bar, change text or graphics … 
Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement