IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 284 Matches Previous Page  |  Next Page
Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

DNS Security Gateway
sponsored by Mimecast
DATA SHEET: In this data sheet, learn how the Mimecast DNS Security Gateway service protects against malicious web activity initiated by user action or malware as a fully cloud-based service.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Mimecast

Intelligent Web Application Security
sponsored by Oracle Dyn
EBOOK: Through the use of bots, threats are becoming more sophisticated, faster, and increasingly difficult to detect. In this e-book learn how you can protect your web applications through 4 informative chapters.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Oracle Dyn

Your WAF Will Eventually Fail You - ISMG and Oracle Dyn Webinar
sponsored by Oracle Dyn
VIDEO: Tune into this on-demand webinar for a review of the current weaknesses in the Web Application Firewall market as well as resources for your organization to improve its security strategy.
Posted: 04 Sep 2018 | Premiered: 04 Sep 2018

Oracle Dyn

Dark Bot Survival Guide
sponsored by Oracle Dyn
EBOOK: What does your bot survival strategy look like? Uncover this dark bot survival guide to learn more about effective web security strategies and how to put bot detection methods to the test.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Oracle Dyn

Forcepoint - Avency
sponsored by Forcepoint
CASE STUDY: Avency, a B2B internet service provider based in Telgte, Germany, made a large investment in a proprietary ISP system that makes it completely independent and autonomous. Learn how they were able to successfully migrate to a new data center solution, increase their business portfolio, and meet their ongoing security requirements.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Forcepoint

The Rise of the Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: Implementing a secure internet gateway (SIG) can help you monitor and prevent malicious traffic from entering or leaving your organization's network. Download this white paper to learn more about SIGs and the secure features they can bring to your organization.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Cisco Umbrella

Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST: Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018

ThreatX

5 Techniques to Protect Against a SQL Injection Attack
sponsored by Alert Logic
EBOOK: SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of cybercriminals and secure your SQL-based apps from injections, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Alert Logic

GHX Trusts Threat X to Secure and Optimize the Performance of the Largest Footprint in Healthcare Supply Chain
sponsored by ThreatX
CASE STUDY: GHX, a healthcare business and data automation company needed to ensure security in their health-care focused technology. Find out how GHX was able to successfully do so using Threat X's Intelligent Web Application Firewall solution.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

ThreatX

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

BMC Software Relies on Threat X to Protect Its Vast Portfolio of Enterprise Applications and Websites Across a Multi-Cloud Environment
sponsored by ThreatX
CASE STUDY: A premier provider of global IT Management found that their traditional security tools could not effectively support and protect their rapidly evolving cloud application portfolio. Find out how they were able to protect their critical business portfolio applications and websites distributed globally across a hybrid cloud environment.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

ThreatX

InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by Katie Moussouris, CEO of Luta Security, to talk about bugs, bug bounties and their impact on security and privacy.
Posted: 24 Aug 2018 | Premiered: Aug 13, 2018

Cylance

Symantec Web Security Service
sponsored by Symantec
WHITE PAPER: As technology evolves, legacy security solutions are becoming less effective. That's where a secure web gateway (SWGs) solution can help. Using a SWG can help you secure all Internet traffic, not only web traffic. Download this report to learn about today's enterprise-security reality and why SWGs could be the key to protecting your data.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Symantec

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

ThreatX

Dynamic Cyber Defenses: A Fresh Approach to an Old Problem
sponsored by ThreatX
RESEARCH CONTENT: In this Frost & Sullivan report, learn why the standard approach of blocking malicious activity has structural shortcomings, and how these prevention shortcomings favor attackers. Also uncover insight about a cloud-based deception approach and a rule-less WAF.
Posted: 02 Jul 2018 | Published: 06 Apr 2018

ThreatX

How to Build an Effective API Security Strategy
sponsored by Imperva
ANALYST REPORT: By 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications. In this Gartner report, explore the importance of key API stakeholders and the 3-step approach to continuous API security.
Posted: 15 Aug 2018 | Published: 08 Dec 2017

Imperva

Is your Site Trusted by Every Visitor on Every Page, Every Time?
sponsored by DigiCert
RESOURCE: Even though all SSL certificates provide the same level of encryption, find out how high-assurance certificates can provide added layers of authentication to give users proof that they can trust who you are and what your site is.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

DigiCert

Is your Site Trusted by Every Visitor on Every Page, Every Time?
sponsored by DigiCert
RESOURCE: Even though all SSL certificates provide the same level of encryption, find out how high-assurance certificates can provide added layers of authentication to give users proof that they can trust who you are and what your site is.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

DigiCert

Is your Site Trusted by Every Visitor on Every Page, Every Time?
sponsored by DigiCert
RESOURCE: Even though all SSL certificates provide the same level of encryption, find out how high-assurance certificates can provide added layers of authentication to give users proof that they can trust who you are and what your site is.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

DigiCert
1 - 25 of 284 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement