IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 270 Matches Previous Page  |  Next Page
Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

2020 Market Guide for DDoS Mitigation Services
sponsored by Akamai Technologies
ANALYST REPORT: According to Gartner, enterprises should "determine their risk level, and pay accordingly for DDoS mitigation services." The Gartner 2020 Market Guide for DDoS Mitigation Services provides important insights into the differences among scrubbing center, CDN, CSP, and IaaS solutions — and when to consider each.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Akamai Technologies

Why Web App Firewalls Aren’t Protecting Your Cloud-Native Apps
sponsored by Traceable
RESOURCE: Take a look at what NG-WAFs do well, what they struggle with, and whether a solution makes up for their gaps.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Traceable

Choosing the WAF That’s Right For You
sponsored by F5 Networks
EBOOK: Use this e-book to help you select the right WAF for your organization.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

F5 Networks

Apps Are Essentials So Your WAF Must Be Effective
sponsored by F5 Networks
EBOOK: Web Application Firewalls (WAFs) help organizations comply with initiatives like PCI-DSS and protect sensitive customer data. However, a WAF needs to minimize risk while also safeguarding business goals. In this e-book learn how to choose the right WAF.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

F5 Networks

Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

Trend Micro Cloud One for Workload Security
sponsored by Trend Micro
DATA SHEET: Optimizing and securing workloads has become a more complex task as server workloads move towards cloud environments, virtual servers and even containers. Read this data sheet to see how Trend Micro’s Cloud One can help organizations meet these 4 key business imperatives and ensure security for physical, virtual, cloud and container workloads.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Trend Micro Cloud One: Application Security
sponsored by Trend Micro
DATA SHEET: As reliance on business applications grows, it becomes increasingly critical to ensure each app and API is adequately protected and accounted for. Read this data sheet to see how Trend Micro’s Cloud One offering thwarts today’s application-specific cyberthreats.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Equifax—Transforming The Organization With Fortify On Demand
sponsored by Micro Focus
WHITE PAPER: In this white paper, discover how Equifax adopted a shift-left culture and secure DevOps practices by integrating Fortify on Demand when transforming development to the cloud.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Micro Focus

Fortify On Demand Mobile Application Security Testing
sponsored by Micro Focus
BROCHURE: Application security becomes more and more important as organizations embrace a growing population of applications. Protecting these applications is especially critical throughout DevOps lifecycles. Read this brochure to see how Fortify on Demand supports DevOps efforts to protect and manage applications.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Micro Focus

Threat Simulator: A Component of Keysight’s Breach Defense Solution
sponsored by Keysight
DATA SHEET: According to Keysight’s security survey, 50% of companies were breached because their cybersecurity solution was not working as expected. And alarmingly, 65% of companies do not verify that their solutions are working correctly. Click this data sheet to cover Keysight’s Threat Simulator, which can help get your security back on track.
Posted: 04 Feb 2021 | Published: 16 Feb 2020


5 Reasons Why SAST + DAST With Micro Focus Fortify Makes Sense
sponsored by Micro Focus
DATA SHEET: Integrating both static (SAST) and dynamic (DAST) application security testing methodologies provides a more comprehensive view of an application’s risk posture. Read this datasheet to discover the top 5 reasons why SAST + DAST with Micro Focus Fortify makes sense.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

Micro Focus

Fortify On Demand Static Application Security Testing
sponsored by Micro Focus
BROCHURE: To address today’s risks and threats, organizations need to be ensuring the protection of their critical applications across the Software Development Lifecycle (SDLC) – however, only a scant 20% integrate AppSec across their SDLC. Read this brochure to learn about the importance of this integration and discover how Fortify can help.
Posted: 02 Feb 2021 | Published: 02 Feb 2021

Micro Focus

Fortify Application Security
sponsored by Micro Focus
DATA SHEET: Fortify has been a leader in the AppSec market for the past few years, recognized by Gartner for their capabilities and trusted by some of the world’s largest Fortune 500 companies. Read this data sheet to learn more about Fortify’s AppSec capabilities and offerings.
Posted: 02 Feb 2021 | Published: 02 Feb 2021

Micro Focus

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

Application Security Stats Flash
sponsored by WhiteHat Security
ANALYST REPORT: API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

WhiteHat Security

The True Cost of a DDoS Attack
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

The Technology behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

The API Security Maturity Model
sponsored by Curity AB
EBOOK: API security has become a forefront issue for modern enterprises. Many API security implementations exist, but not all are effective. How can you ensure that your APIs are mature and secure? Download The API Security Maturity Model, which reframes the degrees of web service development maturity through a security lens.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

API Security Checklist
sponsored by Curity AB
EGUIDE: As APIs grow in usage, they become a more valuable target for cybercriminals. This API Security Checklist was written to help guide you on your journey towards protecting web APIs by offering insight into emerging threats, best practices and expert insights – read on to unlock the full guide.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Curity AB

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security
1 - 25 of 270 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info