IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application SecurityReports
176 - 200 of 235 Matches Previous Page  | Next Page
Information Security - IT Decision Checklist: Application Security
sponsored by Ounce Labs, an IBM Company
EGUIDE: Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.
Posted: 31 Dec 2009 | Published: 31 Dec 2009

Ounce Labs, an IBM Company

E-Book: Protecting Against Web Threats
sponsored by SearchSecurity.com
EBOOK: Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

SearchSecurity.com

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats
sponsored by Webroot
WHITE PAPER: This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.
Posted: 24 Nov 2009 | Published: 23 Sep 2009

Webroot

This Month in the Threat Webscape for October 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Threatscape delivers information about breaking security research topics and today's advanced Internet threats. This Month's 'In the Threatscape' is a review of October's Web threat activity. Watch the video to learn more.
Posted: 20 Nov 2009 | Premiered: 10 Nov 2009

Websense, Inc.

Web Content Control: Five Steps to a Successful Implementation
sponsored by Untangle, Inc.
WHITE PAPER: Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
Posted: 18 Nov 2009 | Published: 30 Oct 2009

Untangle, Inc.

Why Traditional Anti-Malware Solutions Are No Longer Enough
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
Posted: 17 Nov 2009 | Published: 17 Nov 2009

AVG Technologies USA, Inc.

Securing Web Applications and Databases for PCI Compliance
sponsored by Imperva
WHITE PAPER: This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.
Posted: 12 Nov 2009 | Published: 12 Jul 2009

Imperva

Try Rational AppScan
sponsored by IBM
ASSESSMENT TOOL: Download Rational® AppScan® Standard Edition V7.9, previously known as Watchfire AppScan, a leading Web application security testing tool that automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow.
Posted: 03 Nov 2009 | Published: 03 Nov 2009

IBM

Web Application Security for a Smarter Planet
sponsored by IBM
WHITE PAPER: As threats to Web applications continue to grow, IBM offers Web application security for a smarter planet—integrated, end-to-end security to build secure Web applications, run secure Web applications and protect SOA environments.
Posted: 28 Oct 2009 | Published: 09 Jul 2009

IBM

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

The Web Hacking Incidents Database 2009 Bi-Annual Report
sponsored by Breach Security
WHITE PAPER: Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Breach Security

Internet-Scale Identity Systems: An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Ping Identity Corporation

Enabling Enterprise 2.0
sponsored by Websense, Inc.
WHITE PAPER: Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0.
Posted: 20 Aug 2009 | Published: 01 Aug 2009

Websense, Inc.

When Legitimate Sites Threaten Your Network
sponsored by Kaspersky Lab
WHITE PAPER: Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures you can take to protect your business and defend against these attacks.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Websense, Inc.

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success
sponsored by Breach Security
WHITE PAPER: This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies.
Posted: 14 Aug 2009 | Published: 08 Jun 2009

Breach Security

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos, Inc.

Presentation Transcript: State of the Threat
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Websense, Inc.

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos, Inc.

Driving Revenue and Increasing Value with Application Performance Management
sponsored by BlueCoat
EBOOK: As a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.
Posted: 26 Jun 2009 | Published: 22 Dec 2008

BlueCoat

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation
176 - 200 of 235 Matches Previous Page    6 7 8 9 10    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement