IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
Work from Home: An Application and Identity Management Guide
sponsored by EvolveIP
WHITE PAPER: Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Application Control for Dummies
sponsored by VMware International Unlimited Company
EBOOK: Application control offers a simple solution to a complex problem by flipping the security paradigm when it comes to blacklisting vs whitelisting applications. The following eBook, Application Control for Dummies, provides an overview of the history, capabilities and benefits of application control – as well as guidance for getting started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

VMware International Unlimited Company

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios
sponsored by Checkpoint Software Technologies
WHITE PAPER: Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Application Security with NGINX
sponsored by NGINX
WEBCAST: In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.
Posted: 15 Sep 2020 | Premiered: Aug 5, 2020

NGINX

Get the Facts: Mobile App Breaches Are Growing
sponsored by NowSecure
RESOURCE: Imagine how it would feel to have hackers find and exploit vulnerabilities in your organization’s mobile apps before your mobile app security team discovers them. Unfortunately, this is the reality at some organizations. Continue to this article, which highlights key statistics and challenges regarding mobile app security.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

NowSecure
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info