IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application SecurityReports
76 - 100 of 239 Matches Previous Page  | Next Page
Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

SearchSecurity.com

Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by SearchSecurity.com
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Security risks that can affect your industry
sponsored by SearchSecurity.com
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

SearchSecurity.com

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012

Imperva

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

The four rules of complete web protection
sponsored by Sophos, Inc.
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

How to prevent cross-site scripting attacks: Expert tactics
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

SearchSecurity.com

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

IBM Mashup Center
sponsored by IBM
TRIAL SOFTWARE: IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.
Posted: 19 Dec 2011 | Premiered: 19 Dec 2011

IBM

What Security Threats Can We Expect in 2012?
sponsored by Websense, Inc.
WEBCAST: View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
Posted: 15 Dec 2011 | Premiered: Dec 15, 2011

Websense, Inc.

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Social Networking malware: The dangers facing SMBs
sponsored by GFI Software
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Keeping Networks safe from Social Networking
sponsored by BlueCoat
EGUIDE: Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

BlueCoat

E-Guide: Expert insights to application security testing and performance
sponsored by IBM
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

IBM

Build in security and drive innovation
sponsored by IBM
PODCAST: Hear from Patrick Vandenberg, IBM Security & Compliance Marketing Manager and Ewa Hoyt, IBM Security Application & Compliance Marketing manager, on how to make application security part of your development process. Reduce risk and costs, and keep your development teams productive to drive the innovation you need to compete and win.
Posted: 10 Nov 2011 | Premiered: Nov 10, 2011

IBM

Deliver the Web Access Your Users Want With the Control You Need
sponsored by BlueCoat
WHITE PAPER: URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

WebPulse Technical Overview
sponsored by BlueCoat
WHITE PAPER: The Blue Coat WebPulse™ is a cloud-based infrastructure specifically designed to harness the power of user-driven behavior and to translate user input into global web and web threat intelligence. Learn how WebPulse employs multiple technologies to analyze and deliver the fastest and most accurate web ratings service available.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Technical Guide on Collaboration Threat Vectors
sponsored by Websense, Inc.
EBOOK: Techtarget's Security Media Group presents a comprehensive guide to securing collaboration technologies. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

Websense, Inc.
76 - 100 of 239 Matches Previous Page    2 3 4 5 6 7    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement