IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 242 Matches Previous Page  |  Next Page
Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

The New Era of Fraud: A Bot-Driven Threat
sponsored by F5 Networks
WHITE PAPER: With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

F5 Networks

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Build vs. Buy
sponsored by Okta
WHITE PAPER: IT teams have increasingly turned to pre-built tools to offload some of the burden of application development. Customer identity and access management (CIAM) presents developers with a broad range of challenges that a trusted identity layer can help offload easily. Read on to explore the challenges and benefits of CIAM.
Posted: 05 Dec 2019 | Published: 31 Oct 2018

Okta

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

SearchSecurity.com

What Every Company Should Know About Cookies
sponsored by Namogoo
EBOOK: Nearly every website relies on cookies to allow them to collect specific data on their visitors to enhance customer experience. But as helpful as they can be, the information stored on them can pose a privacy risk. In this e-book, explore the various types of cookies and how they will be affected by data privacy laws.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

Namogoo

The Security Concerns of Cloud Cryptomining Services
sponsored by Cisco Umbrella
EGUIDE: With the rise in value and popularity of cryptocurrencies, cybercriminals are often targeting them in their attacks. Since cloud mining providers aren’t bound by the same regulations as a traditional bank, it’s more critical than ever for investors to consider the security practices of cloud cryptomining companies. Read on to get started.
Posted: 26 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

9 Email Security Features to Help Prevent Phishing Attacks
sponsored by Cisco Umbrella
EGUIDE: For as long as email exists, phishing will continue to be a threat. While the risks of phishing can’t be eliminated, your organization can enhance its email security to prevent a breach. In this e-guide, discover 9 email security features designed to help prevent phishing attacks.
Posted: 25 Nov 2019 | Published: 19 Nov 2019

Cisco Umbrella

The Top Automated Bot Threats and How to Stop Them
sponsored by Radware
WHITE PAPER: Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

Online Privacy in a World of Third-Party Services
sponsored by Namogoo
EBOOK: As companies continue to rely on third-party services to enhance the experience of their websites, they risk increasing the vulnerability of customer data. In this e-book, discover the benefits of third-party software, how it works, and why it’s critical to take appropriate security measures when considering a vendor. Read on to learn more.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Namogoo

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

New 2019 Cybercrime Report Tracks Growing Threat of Networked Cybercrime
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions Cybercrime Report provides unique insight into global transaction patterns and emerging cybercrime threats. Join this 50-minute webinar to learn key findings and insights from the 2019 LexisNexis® Risk Solutions Cybercrime Report.
Posted: 06 Nov 2019 | Premiered: Nov 6, 2019

LexisNexis® Risk Solutions

Safeguard your Private Keys with AppViewX
sponsored by AppViewX
WHITE PAPER: When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Malicious Cryptomining Moves Mainstream
sponsored by Cisco Umbrella
EBOOK: The threat of malicious cryptomining will continue to grow. If you’re not protected, it can cost you in all kinds of ways. Find out how to protect your network and your valuable resources in this e-book.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

Cisco Umbrella

Do You Know DNS Security?
sponsored by Cisco Umbrella
RESOURCE: Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? Download this resource to test your DNS security knowledge with an 8-question interactive quiz.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

Cisco Umbrella

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Prescriptive, Unbiased Website Security Advice
sponsored by Tala Security
RESOURCE: The ecommerce economy continues to grow with nearly $3.5 trillion spent in 2019. Website owners have an obligation to protect their sites, their data, and their customers to ensure the integrity of online transactions. In this resource, explore a list of recommendations to help organizations ensure website security.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

Tala Security

10 Commandments for Securing Microservices
sponsored by Radware
RESOURCE: Before considering any next-generation WAF solution, make sure it meets the requirements of both development and operations (DevOps) and security teams. This resource provides a checklist of 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Introduction to DevSecOps
sponsored by Contrast Security
WHITE PAPER: Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Contrast Security

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
ANALYST REPORT: The financial services industry is one of the most sought-after targets for attackers. Staying aware of new attack trends is imperative for financial organizations to keep their systems and customers safe. In the 2019 State of the Internet: Security Financial Services Attack Economy Report, learn how to protect against emerging threats.
Posted: 17 Oct 2019 | Published: 31 Jul 2019

Akamai Technologies

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

API Security: What You Need to Do to Protect Your APIs
sponsored by Data Theorem
ANALYST REPORT: Despite growing awareness of API security, breaches continue to occur. API management and web application firewall vendors are addressing the problem. But, application leaders must design and execute an effective API security strategy to protect their APIs. In this Gartner report, discover recommendations for developing an API security strategy.
Posted: 27 Sep 2019 | Published: 28 Aug 2019

Data Theorem

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon
1 - 25 of 242 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement