IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 208 Matches Previous Page  |  Next Page
Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

How to Protect Your Business from a Magecart Data Skimming Attack
sponsored by Instart
WHITE PAPER: Data and credit card skimming attacks are especially worrying for online businesses. Skimming attacks have increased in scale and scope over the last decade, proving that these types of attacks continue to be a persistent security problem. In this white paper, learn why preventing data access is the only true defense against skimming attacks.
Posted: 16 Apr 2019 | Published: 30 Apr 2019

Instart

Instart DX Cloud March 2019 Release
sponsored by Instart
RESOURCE: In this post, explore the biggest highlights from the March 2019 release of Instart DX Cloud—which provides personalized content and delivery optimizations and powerful protection against sophisticated cyberattacks to ensure a fast, reliable, and secure website.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Instart

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

How Magecart Skimming Attacks Work
sponsored by Instart
RESOURCE: Online data and credit card skimming attacks have become a serious concern for ecommerce websites and web applications around the world. Data skimming attacks typically follow a well-established pattern. In this blog, learn about the 3 things hackers must do to be successful. Also learn how to best defend against skimming attacks.
Posted: 12 Apr 2019 | Published: 21 Mar 2019

Instart

Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Isolation: A Part of the Modern Security Architecture
sponsored by Menlo Security
WHITE PAPER: Cyberattacks are a worldwide threat, and every person, government, and organization connected to the Internet needs to be aware of it. Most attacks leverage the ubiquitous web for proliferation. In this white paper, learn how Menlo Security's multi-tenant platform can create a safe web environment.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Forcepoint Web Security Cloud and Email Security Cloud: Analyst Report
sponsored by Forcepoint
ANALYST REPORT: In this Forrester Total Economic Impact report, discover a framework to evaluate the potential financial impact of Forcepoint's Web Security Cloud and Email Security Cloud on your organization today.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Forcepoint

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Security with AI and Machine Learning
sponsored by Oracle Dyn
WHITE PAPER: Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this e-book, look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

5 Web Application Security Threats You Should Care About
sponsored by Oracle Dyn
WHITE PAPER: Today, threat actors can spread malicious content and execute attacks all over the world, crossing borders—and industries—in a matter of seconds. How can you protect your web applications? In this e-book learn how you can navigate the threat landscape as well as execute an intelligent approach to web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Securing Web Applications
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 22 Mar 2019 | Published: 05 Jun 2018

Oracle Dyn

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Surviving the Bot Matrix
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. This e-book will help understand how to survive the bot matrix and take control of bot detection, mitigation and elimination. Download the e-book now, so you can stay above the bot epidemic today.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

A Developer's Guide to the OWASP Top 10 2017
sponsored by Micro Focus
WHITE PAPER: Download this guide to learn how developers can enhance their secure coding skills and reduce application security risks by focusing on the OWASP top 10.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Micro Focus

Avast Business Secure Web Gateway
sponsored by Avast Business
WEBCAST: It's no secret that users pose one of the biggest threats to business security today – whether it's clicking on suspicious email links or visiting unsafe websites. In this webcast, learn how the new Avast Business Secure Web Gateway protects SMBs from sophisticated web threats while being easily manageable and fully scalable.
Posted: 15 Mar 2019 | Premiered: Mar 4, 2019

Avast Business

Two Ways To Reduce Third-Party Tag Security Risks
sponsored by Instart
RESOURCE: Today's websites rely on third-party tags. These tags are scripts developed by third-parties that you include on your website. There's one major problem: browsers provide limited abilities to control a third-party tag, which in turn exposes you to major security risks. In this article, learn what you can do to mitigate third-party tag exposure.
Posted: 12 Mar 2019 | Published: 14 Jan 2019

Instart

How to Evaluate Bot Management Solutions
sponsored by Radware
WHITE PAPER: Regardless of the size of your organization, the escalating intensity of global bot traffic and the increasing severity of its overall impact mean that bot management solutions are crucial to ensuring business continuity and success. Several bot management options are available, but which one is right for you? Download this white paper to find out.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Radware

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Cryptojacking
sponsored by Symantec
WEBCAST: Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.
Posted: 06 Mar 2019 | Premiered: Mar 6, 2019

Symantec

Internet Security Threat Report: February 2019
sponsored by Symantec
RESEARCH CONTENT: Understanding the latest facts, figures and trends is essential when making adjustments and improvements to your enterprise security strategy. This 2019 research report looks at topics such as formjacking, cryptojacking and ransomware to see how they have trended over the last year.
Posted: 05 Mar 2019 | Published: 28 Feb 2019

Symantec
1 - 25 of 208 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement