IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 311 Matches Previous Page  |  Next Page
Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

WhiteSource

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017

WhiteSource

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

New Research Reveals Key Strategy to Manage Open Source Security
sponsored by WhiteSource
WEBCAST: Open source is a dominant factor in the evolution of technology and technology is now highly dependent on open source software (OSS). Although, OSS is not without risks. Listen as Scott Crawford from 451 Research discusses the rise of OSS, security composition analysis and ways to handle security vulnerabilities.
Posted: 09 Jan 2019 | Premiered: Nov 20, 2018

WhiteSource

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
WEBCAST: Open source software has become an indispensible part of the software industry. However, development and security teams are challenged to meet open source security objectives, without compromising on speed and quality. This webcast discusses the key strategy for effective vulnerability management.
Posted: 09 Jan 2019 | Premiered: Nov 15, 2018

WhiteSource

When it Comes to Securing Your Open Source Components, WhiteSource Has You Fully Covered
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of modern applications. However, development teams have been neglectful when it comes to ensuring that they meet basic security standards. In this white paper, learn about open source security challenges, the two pillars of open source security and why automation is king.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

The Complete Guide on Open Source Security
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of application software, providing developers with a wealth of off-the-shelf possibilities that they can use for assembling their products. However, the industry has been lax when it comes to meeting basic security standards. In this white paper, learn about securing open source components.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Download this report from the Ponemon Institute that reveals a breakdown of specific costs that organizations could incur from web application and DoS attacks, including operational disruptions to technical support and user productivity issues.
Posted: 28 Dec 2018 | Published: 31 Oct 2018

Akamai Technologies

Protect Your Online Business From Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

Akamai Technologies

Web Application Firewalls: 2018 Executive Summary
sponsored by Akamai Technologies
RESEARCH CONTENT: Enterprise security teams considering WAFs should evaluate the pros and cons of stand-alone and cloud-based WAFs for their specific environments. Download this executive summary of the 2018 Gartner Magic Quadrant for Web Application Firewalls for guidance on vendors and specific products in the WAF arena.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

Web Application Firewalls Report
sponsored by Akamai Technologies
ANALYST REPORT: Today, applications are far too easily breached. In this Forrester Report, explore the 10 leading Web Application Firewall (WAF) vendors that matter most and how they stack up.
Posted: 21 Dec 2018 | Published: 25 Jun 2018

Akamai Technologies

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
RESOURCE: Ponemon Institute conducted a study to understand changes in the cost and consequences of web application and denial of service attacks. The report is divided into two sections. The first section addresses web application security and the second focuses on DoS attacks. Read this report to find key takeaways to help your organization.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

Akamai Technologies

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

Deeper Security Coverage for Any Environment
sponsored by Alert Logic
RESOURCE: When alerts and incidents coming in are at an all-time high, IT teams looks for additional security options to help. In this resource, learn how to block malicious web traffic, reduce false positives, conduct threat analysis, and more.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Alert Logic

Armor Monitored WAF
sponsored by Armor
RESOURCE: Learn how this Web Application Firewall (WAF) can help stop OWASP's Top Ten applications attacks including SQL injections, XML External Entity (XXE) attacks, and cross-site scripting (XSS) attacks.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

Armor

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

2018 State of the Internet: Credential Stuffing Attacks Report
sponsored by Akamai Technologies
RESEARCH CONTENT: Discover how credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, is continuing to affect companies worldwide.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

Akamai Technologies

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Corporate Web Security
sponsored by Forcepoint
ANALYST REPORT: This Radicati Market Quadrant compares the strengths and weaknesses of 12 corporate web security vendors including Symantec, Forcepoint, McAfee, Sophos, and more.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

Forcepoint

Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018

Akamai Technologies

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT: Based on research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017

Akamai Technologies

Machine Learning Pushes Fortiweb to the Head of the WAF Class
sponsored by Fortinet, Inc.
WHITE PAPER: Web application firewalls (WAFs) have taken center stage in enterprise security architectures due to the complexity of the threat landscape. In this white paper, discover the key features of a WAF that meets the security and operational requirements that security organizations need.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Navigating a Security Wasteland
sponsored by ThreatConnect
RESOURCE: Inside, Adam Vincent – CEO and co-founder of ThreatConnect, takes a deep dive with Kathie Miley –COO of Cybrary, to discuss how managing your enterprise security organization like a small business is pivotal when it comes to application and cloud security.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

ThreatConnect
1 - 25 of 311 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement