IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 259 Matches Previous Page  |  Next Page
8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

Best Practices: Protect Your Apps from Cyberattckcs
sponsored by F5 Networks
WHITE PAPER: The skyrocketing popularity of websites and web-based applications has come with a corresponding explosion in the numbers, types, magnitudes, and costs of attacks that specifically target app vulnerabilities. Continue reading to reveal who is behind the security breaches, and what you can do to protect your apps.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

F5 Networks

Evolve Your Website Security
sponsored by DigiCert
WHITE PAPER: The growth of cybercrime is skyrocketing, which means advanced threats are putting website ecosystems at risk. Website security must be evolved in line with these growing challenges. Find out how to protect your organization's reputation against these threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

DigiCert

Automating Security Best Practices on AWS
sponsored by Barracuda
RESOURCE: How can you guarantee the security of your applications? Take a glimpse at the resource to learn how incorporating application security directly into the code building process accelerates your development of web applications with confidence.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Enhancing Web App and Browser Security
sponsored by Citrix
WHITE PAPER: In a world where bad actors can find a point of infiltration even in a well-orchestrated defense, find out how you can improve browser and web app security.
Posted: 15 Jun 2018 | Published: 31 Jan 2018

Citrix

Dark Bot Survival Guide: Strategies for Understanding the evolving Web Security Threat Landscape
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. Access this survival guide to gain strategies for better understanding the evolving web security threat landscape.
Posted: 07 Jun 2018 | Published: 07 Jun 2018

Oracle Dyn

Securing Web Applications Building a Strategy for Defense Against Malicious Bots
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Oracle Dyn

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

How to Enhance Your Application Security Strategy with F5 on AWS
sponsored by Amazon Web Services
WEBCAST: In this webinar, listen to Nick Matthews of AWS and Dave Morrisey and Nathan McKay from F5 as they discuss how WAF solutions can help you safeguard your data, meet compliance standards and establish ongoing protection for your workloads on the cloud.
Posted: 01 Jun 2018 | Premiered: Apr 24, 2018

Amazon Web Services

Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018

Proofpoint, Inc.

How Fortinet Security Fabric Addresses Enterprise Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to build a security fabric that addresses enterprise security concerns stemming from digital transformation. With advanced threats proliferating exponentially, find out how to create end-to-end protection for your network and the assets on it.
Posted: 29 May 2018 | Published: 29 May 2018

Fortinet, Inc.

Security Transformation Requires a Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how to build your security transformation strategy for the growing attack surfaces of digital-first businesses that increasingly rely on IoT, SDN, mobile, and multi-cloud technologies.
Posted: 25 May 2018 | Published: 25 May 2018

Fortinet, Inc.

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: According to F5 Labs Research, 53% of data breaches target the application layer. Take a look at this resource to gain insight into the ROI benefits of boosting cloud and application layer security.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

F5 Networks

Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Citrix

Standing Up to Cryptojacking: Best Practices for Fighting Back
sponsored by Sophos
WHITE PAPER: Cryptojacking has recently erupted due to the surge in value of cryptocurrencies. This resource explores the differences between legitimate mining and cryptojacking, how cryptojacking works and the costs of cryptojacking to today's organizations.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

2018 Annual Cybersecurity Report
sponsored by Cisco Umbrella
WHITE PAPER: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

Cisco Umbrella

The Confidence Crisis: Protecting Applications Against Data Theft and Bot Attacks
sponsored by Radware
WHITE PAPER: 68% of retailers lack certainty they could secure credit card data during peak demand periods, according to the National Retail Federation. Take a look at this report to gain insight into protecting applications against data theft and bot attacks targeting various industries.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Radware

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk-sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
EBOOK: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

Web Application Firewall
sponsored by NSS Labs
RESOURCE: The web application firewall market is projected to grow to over $650M in 2019, according to NSS Labs. This resource offers an overview of protecting networks and web applications by utilizing web applications firewalls.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

NSS Labs

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR
1 - 25 of 259 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement