IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 252 Matches Previous Page  |  Next Page
How to Secure Complex Cloud Environments and Reduce Costs With Sophos UTM on Amazon Web Services
sponsored by AWS - Sophos
WHITE PAPER: Inside, explore how you can keep your data protected from common threats over HTTP/HTTPS without incurring excessive costs or restricting innovation.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

AWS - Sophos

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: According to F5 Labs Research, 53% of data breaches target the application layer. Take a look at this resource to gain insight into the ROI benefits of boosting cloud and application layer security.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

F5 Networks

Web Application Firewall (WAF) Security Value Map
sponsored by Citrix
WHITE PAPER: This resource shines light into an independent test and provides detailed information about Citrix's web application firewall product, including its security effectiveness, performance, and TCO.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Citrix

Ransomware: Block Attackers with a Layered Defense
sponsored by Cisco & Dimension Data
WHITE PAPER: Ransomware is affecting companies across all industries at an alarming rate. This resource reveals what ransomware is, what it does, and how organizations can defend against it.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

Cisco & Dimension Data

Standing Up to Cryptojacking: Best Practices for Fighting Back
sponsored by Sophos
WHITE PAPER: Cryptojacking has recently erupted due to the surge in value of cryptocurrencies. This resource explores the differences between legitimate mining and cryptojacking, how cryptojacking works and the costs of cryptojacking to today's organizations.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Sophos

2018 Cybersecurity Report
sponsored by Cisco & Dimension Data
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Cisco & Dimension Data

2018 Annual Cybersecurity Report
sponsored by Cisco Umbrella
WHITE PAPER: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

Cisco Umbrella

10 Key Tips for Securing DNS – A For Dummies Guide 2018
sponsored by Infoblox
EBOOK: Because the internet is constantly being attacked and hacked, enterprises must work to defend themselves. Take a look at this For Dummies e-book to learn how to optimize your security operations to protect users and data from malware as well as improve application and service availability.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Infoblox

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Open Source Security in 2017: Lessons Learned for the New Year
sponsored by Flexera Software
WEBCAST: The usage of open source software has changed dramatically in the past year. Leverage this webcast to learn about the usage and awareness of open source software in 2017 and how to better prepare for software security in 2018.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

The Confidence Crisis: Protecting Applications Against Data Theft and Bot Attacks
sponsored by Radware
WHITE PAPER: 68% of retailers lack certainty they could secure credit card data during peak demand periods, according to the National Retail Federation. Take a look at this report to gain insight into protecting applications against data theft and bot attacks targeting various industries.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Radware

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

Top 5 Database Security Threats
sponsored by Imperva
WHITE PAPER: According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk-sensitive organizations must remain a step ahead in their security posture.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Imperva

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
EBOOK: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Web Application Security in a Digitally Connected World
sponsored by Radware
RESEARCH CONTENT: According to a recent Ponemon Institute study, 68% of organizations admit low confidence in their information security posture. Explore this research report to gain insight into 3 web application security challenges facing organizations today.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Radware

Web Application Firewall
sponsored by NSS Labs
RESOURCE: The web application firewall market is projected to grow to over $650M in 2019, according to NSS Labs. This resource offers an overview of protecting networks and web applications by utilizing web applications firewalls.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

NSS Labs

The 5 News Headlines You Don't Want to Be About Your Organization
sponsored by Juniper Networks
RESOURCE: 1/4 of major organizations experience at least one network breach each month, according to The Cyber Security Breaches Survey. This resource provides 5 security worse case scenarios and advice on how to prevent your organization from appearing in cyberattack news headlines.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Juniper Networks

7 Tough Questions to Ask Before Switching Certification Authorities
sponsored by Entrust, Inc.
WHITE PAPER: A certification authority is responsible for the issuance and management platform of digital certificates, which secure internal servers, web applications, emails and more. This resource offers 7 tough questions to ask before switching certification authorities.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Entrust, Inc.

The Urgent Concerns Facing Customers with SSL Certificates
sponsored by Entrust, Inc.
WHITE PAPER: How much security is your SSL providing? This Frost & Sullivan paper offers strategies for dealing with disruptions of SSL certificates. In addition, uncover questions to consider during your risk management planning.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Entrust, Inc.

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Application Security Testing Magic Quadrant
sponsored by WhiteHat Security
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

WhiteHat Security

2017 Application Security Statistics Report
sponsored by WhiteHat Security
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security
1 - 25 of 252 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement