IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 297 Matches Previous Page  |  Next Page
2018 State of the Internet: Credential Stuffing Attacks Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Discover how credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, is continuing to affect companies worldwide.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

Akamai Technologies

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Corporate Web Security
sponsored by Forcepoint
ANALYST REPORT: This Radicati Market Quadrant compares the strengths and weaknesses of 12 corporate web security vendors including Symantec, Forcepoint, McAfee, Sophos, and more.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

Forcepoint

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

Machine Learning Pushes Fortiweb to the Head of the WAF Class
sponsored by Fortinet, Inc.
WHITE PAPER: Web application firewalls (WAFs) have taken center stage in enterprise security architectures due to the complexity of the threat landscape. In this white paper, discover the key features of a WAF that meets the security and operational requirements that security organizations need.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Navigating a Security Wasteland
sponsored by ThreatConnect
RESOURCE: Inside, Adam Vincent – CEO and co-founder of ThreatConnect, takes a deep dive with Kathie Miley –COO of Cybrary, to discuss how managing your enterprise security organization like a small business is pivotal when it comes to application and cloud security.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

ThreatConnect

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

How to Choose a Next-Generation Web Application Firewall
sponsored by Fortinet, Inc.
EBOOK: In this e-book discover how to choose a web application firewall that has sophisticated behavioral threat detection, excellence in core WAF capabilities, and more.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Fortinet, Inc.

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

DNS Security Gateway
sponsored by Mimecast
DATA SHEET: In this data sheet, learn how the Mimecast DNS Security Gateway service protects against malicious web activity initiated by user action or malware as a fully cloud-based service.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Mimecast

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST: Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018

ThreatX

5 Techniques to Protect Against a SQL Injection Attack
sponsored by Alert Logic
EBOOK: SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of cybercriminals and secure your SQL-based apps from injections, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Alert Logic

GHX Trusts Threat X to Secure and Optimize the Performance of the Largest Footprint in Healthcare Supply Chain
sponsored by ThreatX
CASE STUDY: GHX, a healthcare business and data automation company needed to ensure security in their health-care focused technology. Find out how GHX was able to successfully do so using Threat X's Intelligent Web Application Firewall solution.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

ThreatX

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

BMC Software Relies on Threat X to Protect Its Vast Portfolio of Enterprise Applications and Websites Across a Multi-Cloud Environment
sponsored by ThreatX
CASE STUDY: A premier provider of global IT Management found that their traditional security tools could not effectively support and protect their rapidly evolving cloud application portfolio. Find out how they were able to protect their critical business portfolio applications and websites distributed globally across a hybrid cloud environment.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

ThreatX

You Can't Fight Today's DoS Attacks With Yesterday's WAF
sponsored by F5 Networks
RESOURCE: Traditional WAFs have prevented numerous application attacks by applying protocol compliance and signature comparisons to filter and block potential attacks. However, these WAFs are ill-equipped to keep up with more advanced attacks. Read on to learn how you can replace your traditional WAF with an advanced WAF, today.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

Intelligent Web Application Security
sponsored by Oracle Dyn
EBOOK: Through the use of bots, threats are becoming more sophisticated, faster, and increasingly difficult to detect. In this e-book learn how you can protect your web applications through 4 informative chapters.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Oracle Dyn

Your WAF Will Eventually Fail You - ISMG and Oracle Dyn Webinar
sponsored by Oracle Dyn
VIDEO: Tune into this on-demand webinar for a review of the current weaknesses in the Web Application Firewall market as well as resources for your organization to improve its security strategy.
Posted: 04 Sep 2018 | Premiered: 04 Sep 2018

Oracle Dyn

Dark Bot Survival Guide
sponsored by Oracle Dyn
EBOOK: What does your bot survival strategy look like? Uncover this dark bot survival guide to learn more about effective web security strategies and how to put bot detection methods to the test.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Oracle Dyn
1 - 25 of 297 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement