IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by, powered by an online computer dictionary
Web Application Security Reports
1 - 25 of 314 Matches Previous Page  |  Next Page
Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


Cybersecurity: The Human Challenge
sponsored by Sophos
ANALYST REPORT: If your organization is looking for a direction to turn regarding cybersecurity, then it may help to see what others have been prioritizing. View this Sophos report to learn perspectives from 5,000 IT managers across 26 countries. It will provide brand new insights into the state of cybersecurity skills and resources across the globe.
Posted: 23 Nov 2020 | Published: 30 Oct 2020


Upgrade the Hunt with Splunk and DomainTools
sponsored by DomainTools
WEBCAST: Splunk has just released an update for its prominent app DomainTools that offers enhanced detection, monitoring and diagnostic capabilities as well as more customization, self-service capabilities and deeper contexts within enterprise security. Watch this webcast to learn how you may be able to take your threat hunt to the next level.
Posted: 23 Nov 2020 | Premiered: Nov 23, 2020


Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Your Guide to DNS Security
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020


The Online Retailer’s Guide to Higher Profitability
sponsored by Cloudflare and Queue IT
EBOOK: Retailers are preparing for the upcoming holidays, the most lucrative time of the year for online shopping. If you haven’t already begun capacity planning or upgrades to your online store infrastructure, there’s still time to get ready. View this guide to see a checklist to make sure your online store is ready for the holidays.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cloudflare and Queue IT

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

6 Critical Flaws That Can Crash Your Website Under Load
sponsored by Cloudflare and Queue IT
EBOOK: You’ve used your budget on social media, ads and preparations for what should be the year’s biggest campaign just to see your website buckle under the stress of thousands of simultaneous users. Your worst nightmare came true, but what went wrong? Read this e-book to learn why your website might struggle under heavy load.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Cloudflare and Queue IT

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

Overview of Dark Web Threats Against the Gaming Industry
sponsored by Sixgill
ANALYST REPORT: Discussions of all things related to gaming thrive on the deep and dark web. Apps such as Discord and Telegram allow gamers to exchange reviews about the latest games, swap strategies or simply socialize with their fellow gamers. But the dark side of these chat rooms involve hacking, fraud and even DDoS. Read this report to learn more.
Posted: 13 Nov 2020 | Published: 13 Nov 2020


2020 Web Application Firewalls Analyst Report
sponsored by Akamai
ANALYST REPORT: For the fourth year in a row, Gartner has named Akamai a Leader in the 2020 Magic Quadrant Leader for web application firewalls (WAFs). Download the full report which features evaluations of 10 WAF vendors.
Posted: 12 Nov 2020 | Published: 12 Nov 2020


Turn a Mobile App Into a Major Win
sponsored by Onegini
CASE STUDY: For organizations in the healthcare industry, mobile applications and telemedicine are becoming the norm. Read this case study to see how VGZ, one of the largest health insurers in the Netherlands, was able to build an application that was secure, complaint and faster than their website – without sacrificing user experience.
Posted: 12 Nov 2020 | Published: 12 Nov 2020


SIG - AV-TEST Evaluates Secure Web Gateway and DNS-Layer Security Efficacy
sponsored by Cisco Umbrella
ANALYST REPORT: In September and October 2020 AV-TEST performed a review of comparable security offerings from Akamai, Infoblox, Palo Alto Networks, Netskope, Cisco, and Zscaler. The test was commissioned by Cisco to determine how well vendors protected remote workers against malware, phishing sites and malicious websites.
Posted: 11 Nov 2020 | Published: 30 Oct 2020

Cisco Umbrella

Sixgill Report - #NoFilter: Social Media Hacking From The Underground
sponsored by Sixgill
WHITE PAPER: Because everyone is locked indoors, consumer usage of social media platforms has increased dramatically. Now, there’s another epidemic in the form of inorganic social media engagement (likes, views, followers, etc.) that points to a much larger problem – underground social media hacking. Read this report to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020


Bizcloud Experts Announces Acceptance Into AWS WAF Service Delivery Program
sponsored by AWS BizCloud
RESOURCE: AWS’ web application firewall (WAF) gives app dev teams the ability to design, deploy and protect enterprise web applications, distributed content, or APIs against common web exploits that potentially affect availability, compromise security or consume excessive resources. Read this article to learn about a new AWS WAF service delivery partner.
Posted: 10 Nov 2020 | Published: 21 Jul 2020

AWS BizCloud

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020


State of the Internet / Security: Loyalty for Sale – Retail and Hospitality Fraud
sponsored by Akamai Technologies
ANALYST REPORT: The numbers speak for themselves: Retail, travel and hospitality all attracted a startling 63% of credential stuffing attacks and 41% of web attacks. In this new State of the Internet/Security report, Akamai goes beyond this data, taking you into the criminal marketplace that makes these industries and their loyalty programs such popular targets.
Posted: 04 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Akamai Prolexic
sponsored by Akamai Technologies
VIDEO: Distributed denial-of-service (DDoS) attacks can vary in size and scope; each with the potential to knock your website offline and send business grinding to a halt. Fortunately, Akamai’s Prolexic pairs automated, proactive DDoS mitigation tools with unmatched visibility and skilled response teams. Watch Prolexic in action in this product demo.
Posted: 04 Nov 2020 | Premiered: 04 Nov 2020

Akamai Technologies

AT&T Content Delivery Network (ACDN) Cloud Security Solutions -- Prolexic Services
sponsored by AT&T Cybersecurity
DATA SHEET: In this brief, learn how Prolexic services from AT&T Content Delivery Network can help provide comprehensive protection against a broad range of DDoS attack types and help to defend against today’s high-bandwidth, sustained attacks.
Posted: 04 Nov 2020 | Published: 04 Nov 2020

AT&T Cybersecurity

DDoS Extortion Battle Checklist
sponsored by Akamai Technologies
RESOURCE: Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming and financial services. Are you prepared to respond if you’re targeted? In this checklist, learn key attack responses and how best to work with a DDoS mitigation service provider.
Posted: 03 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
RESOURCE: DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared are your best defense against DDoS attacks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Akamai Technologies

Turn Your Phishing Links Into Read Only
sponsored by Menlo Security
WEBCAST: Check out this webcast to uncover the 3 email security limitations of Office 365 and discover how Menlo can ‘air gap” your enterprise network from the pubic web while still allowing employees seamless access to the internet.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Menlo Security

Application Control for Dummies
sponsored by VMware International Unlimited Company
EBOOK: Application control offers a simple solution to a complex problem by flipping the security paradigm when it comes to blacklisting vs whitelisting applications. The following eBook, Application Control for Dummies, provides an overview of the history, capabilities and benefits of application control – as well as guidance for getting started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

VMware International Unlimited Company
1 - 25 of 314 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info